Analysis

  • max time kernel
    66s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2022, 03:45

General

  • Target

    cheat_hack_v7_2.exe

  • Size

    3.2MB

  • MD5

    fe74930f45167ca92ae63161b4bd6b5f

  • SHA1

    afc2746c7b944d85fb8f776faf931aabb58661d9

  • SHA256

    56a91124bc5fc5374a90995d42d6e9d74546096555b16898a011811ad420d658

  • SHA512

    52d6c4c1a90b97ad7a87858d90986bc6d6f589d3a6303e44c498c4a9de0924f3f3be5b95b1a2bbf93dd34e4abf5d86e291c749a0db08ea9483fafe249aa94e46

  • SSDEEP

    49152:CG5UfgJF6rmQhlHWqyz6F3bkgHDmDkjBqTvw1BN1V3RsoihuafksZhvHi6lwhNi9:CG5QgJRwlgzSbH2TTvw1bmuBUCYwbi9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cheat_hack_v7_2.exe
    "C:\Users\Admin\AppData\Local\Temp\cheat_hack_v7_2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\7zS0E7C3726\GenericSetup.exe
      .\GenericSetup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS0E7C3726\GenericSetup.exe

    Filesize

    8.1MB

    MD5

    fffd5cc10b8005fb12c592d13fead02f

    SHA1

    ee4a4852528b41d13a90520c0df3d6c13c77d30c

    SHA256

    246b1ee6e676d9e0012b5f9f5b68d98b4bb81597d6c739ff8377e1af1fbeafa4

    SHA512

    54543275ab0421ffc4ac496f72ccb8aa7534307dda1e843ea241f0222d75b21e06c1024919e2c2ea0e1dc49923dbacc4bf93fa200a90c6650f19bd410717c29f

  • C:\Users\Admin\AppData\Local\Temp\7zS0E7C3726\GenericSetup.exe

    Filesize

    8.1MB

    MD5

    fffd5cc10b8005fb12c592d13fead02f

    SHA1

    ee4a4852528b41d13a90520c0df3d6c13c77d30c

    SHA256

    246b1ee6e676d9e0012b5f9f5b68d98b4bb81597d6c739ff8377e1af1fbeafa4

    SHA512

    54543275ab0421ffc4ac496f72ccb8aa7534307dda1e843ea241f0222d75b21e06c1024919e2c2ea0e1dc49923dbacc4bf93fa200a90c6650f19bd410717c29f

  • C:\Users\Admin\AppData\Local\Temp\7zS0E7C3726\GenericSetup.exe.config

    Filesize

    814B

    MD5

    fd63ee3928edd99afc5bdf17e4f1e7b6

    SHA1

    1b40433b064215ea6c001332c2ffa093b1177875

    SHA256

    2a2ddbdc4600e829ad756fd5e84a79c0401fa846ad4f2f2fb235b410e82434a9

    SHA512

    1925cde90ee84db1e5c15fa774ee5f10fa368948df7643259b03599ad58cfce9d409fd2cd752ff4cbca60b4bbe92b184ff92a0c6e8b78849c4497d38266bd3b4

  • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1672202714\sciter32.dll

    Filesize

    5.6MB

    MD5

    b431083586e39d018e19880ad1a5ce8f

    SHA1

    3bbf957ab534d845d485a8698accc0a40b63cedd

    SHA256

    b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b

    SHA512

    7805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b

  • memory/4768-136-0x0000000000590000-0x0000000000DA0000-memory.dmp

    Filesize

    8.1MB

  • memory/4768-137-0x0000000006380000-0x00000000063E6000-memory.dmp

    Filesize

    408KB

  • memory/4768-138-0x0000000008780000-0x0000000008D24000-memory.dmp

    Filesize

    5.6MB

  • memory/4768-139-0x0000000008E30000-0x0000000008EC2000-memory.dmp

    Filesize

    584KB