Analysis
-
max time kernel
2s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
17/03/2023, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
cheese_itz_free_internal_cheat.exe
Resource
win10-20230220-en
General
-
Target
cheese_itz_free_internal_cheat.exe
-
Size
5.7MB
-
MD5
796c72650f2ae0423d4c9db1190e0ce1
-
SHA1
61f317b74d79297752830c1a3be63b5b1aff3a91
-
SHA256
049cfd5fcb6b355aa9fe60a7e696fe94cdc69699143ac2d68bb379811a9de5a5
-
SHA512
544819fd9e06c93fff12b1113ce2cb9cf1de4821f71dfa5585c49847fa763e9f1d1bf52ef6de0f471acdfd4f39e04e7c8a99488f4e82c74bcda410edc695ac8f
-
SSDEEP
98304:LBtgDxvouTtjn++T7tjsxwCgUSnKPlDg9g/CSS5nyuG3UgsvTNZxJyxL:LBmDloGz+atjsxdgUiIDgBC7sv5Zx4
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3100 cheese_itz_free_internal_cheat.exe -
Kills process with taskkill 56 IoCs
pid Process 1904 taskkill.exe 5068 taskkill.exe 4156 taskkill.exe 596 taskkill.exe 2964 taskkill.exe 4844 taskkill.exe 4040 taskkill.exe 4748 taskkill.exe 1920 taskkill.exe 4900 taskkill.exe 4048 taskkill.exe 920 taskkill.exe 3416 taskkill.exe 220 taskkill.exe 2992 taskkill.exe 4140 taskkill.exe 4324 taskkill.exe 2764 taskkill.exe 5060 taskkill.exe 4916 taskkill.exe 4540 taskkill.exe 2956 taskkill.exe 1316 taskkill.exe 3148 taskkill.exe 792 taskkill.exe 1588 taskkill.exe 3348 taskkill.exe 1296 taskkill.exe 2724 taskkill.exe 872 taskkill.exe 2496 taskkill.exe 4072 taskkill.exe 5036 taskkill.exe 4472 taskkill.exe 3628 taskkill.exe 4380 taskkill.exe 4512 taskkill.exe 4296 taskkill.exe 1244 taskkill.exe 2436 taskkill.exe 3764 taskkill.exe 3876 taskkill.exe 796 taskkill.exe 4432 taskkill.exe 5080 taskkill.exe 4732 taskkill.exe 4204 taskkill.exe 600 taskkill.exe 4804 taskkill.exe 1016 taskkill.exe 880 taskkill.exe 2596 taskkill.exe 756 taskkill.exe 4476 taskkill.exe 5040 taskkill.exe 508 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3100 cheese_itz_free_internal_cheat.exe 3100 cheese_itz_free_internal_cheat.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4160 3100 cheese_itz_free_internal_cheat.exe 67 PID 3100 wrote to memory of 4160 3100 cheese_itz_free_internal_cheat.exe 67 PID 3100 wrote to memory of 4188 3100 cheese_itz_free_internal_cheat.exe 68 PID 3100 wrote to memory of 4188 3100 cheese_itz_free_internal_cheat.exe 68 PID 4188 wrote to memory of 4156 4188 cmd.exe 69 PID 4188 wrote to memory of 4156 4188 cmd.exe 69 PID 3100 wrote to memory of 5016 3100 cheese_itz_free_internal_cheat.exe 70 PID 3100 wrote to memory of 5016 3100 cheese_itz_free_internal_cheat.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\cheese_itz_free_internal_cheat.exe"C:\Users\Admin\AppData\Local\Temp\cheese_itz_free_internal_cheat.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im procexp.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\taskkill.exetaskkill /f /im procexp.exe3⤵
- Kills process with taskkill
PID:4156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 82⤵PID:5016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im procexp64.exe >nul 2>&12⤵PID:4492
-
C:\Windows\system32\taskkill.exetaskkill /f /im procexp64.exe3⤵
- Kills process with taskkill
PID:4732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im procexp64.exe >nul 2>&12⤵PID:4132
-
C:\Windows\system32\taskkill.exetaskkill /f /im procexp64.exe3⤵
- Kills process with taskkill
PID:4140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mafiaengine-i386.exe >nul 2>&12⤵PID:1404
-
C:\Windows\system32\taskkill.exetaskkill /f /im mafiaengine-i386.exe3⤵
- Kills process with taskkill
PID:1920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Mafia Engine.exe >nul 2>&12⤵PID:2888
-
C:\Windows\system32\taskkill.exetaskkill /f /im Mafia Engine.exe3⤵
- Kills process with taskkill
PID:3876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mafiaengine-x86_64.exe >nul 2>&12⤵PID:4244
-
C:\Windows\system32\taskkill.exetaskkill /f /im mafiaengine-x86_64.exe3⤵
- Kills process with taskkill
PID:2964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Tutorial-i386.exe >nul 2>&12⤵PID:1496
-
C:\Windows\system32\taskkill.exetaskkill /f /im Tutorial-i386.exe3⤵
- Kills process with taskkill
PID:1904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Tutorial-x86_64.exe >nul 2>&12⤵PID:1140
-
C:\Windows\system32\taskkill.exetaskkill /f /im Tutorial-x86_64.exe3⤵
- Kills process with taskkill
PID:4540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mafiaengine-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:4788
-
C:\Windows\system32\taskkill.exetaskkill /f /im mafiaengine-x86_64-SSE4-AVX2.exe3⤵
- Kills process with taskkill
PID:2956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&12⤵PID:3224
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumperClient.exe3⤵
- Kills process with taskkill
PID:4844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&12⤵PID:4884
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumper.exe3⤵
- Kills process with taskkill
PID:4900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4916
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
PID:1316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:508
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
PID:796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&12⤵PID:792
-
C:\Windows\system32\taskkill.exetaskkill /f /im ProcessHacker.exe3⤵
- Kills process with taskkill
PID:1588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&12⤵PID:4828
-
C:\Windows\system32\taskkill.exetaskkill /f /im idaq.exe3⤵
- Kills process with taskkill
PID:756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&12⤵PID:4016
-
C:\Windows\system32\taskkill.exetaskkill /f /im idaq64.exe3⤵
- Kills process with taskkill
PID:4476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&12⤵PID:4524
-
C:\Windows\system32\taskkill.exetaskkill /f /im Wireshark.exe3⤵
- Kills process with taskkill
PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&12⤵PID:2112
-
C:\Windows\system32\taskkill.exetaskkill /f /im Fiddler.exe3⤵
- Kills process with taskkill
PID:4048
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&12⤵PID:4772
-
C:\Windows\system32\taskkill.exetaskkill /f /im FiddlerEverywhere.exe3⤵
- Kills process with taskkill
PID:4432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&12⤵PID:4484
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos64.exe3⤵
- Kills process with taskkill
PID:4380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&12⤵PID:4504
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos.exe3⤵
- Kills process with taskkill
PID:4512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&12⤵PID:5052
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos32.exe3⤵
- Kills process with taskkill
PID:5080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&12⤵PID:5100
-
C:\Windows\system32\taskkill.exetaskkill /f /im de4dot.exe3⤵
- Kills process with taskkill
PID:5068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Cheat Engine.exe >nul 2>&12⤵PID:4352
-
C:\Windows\system32\taskkill.exetaskkill /f /im Cheat Engine.exe3⤵
- Kills process with taskkill
PID:4204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&12⤵PID:4304
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe3⤵
- Kills process with taskkill
PID:4296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:3964
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe3⤵
- Kills process with taskkill
PID:4324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:4220
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe3⤵
- Kills process with taskkill
PID:3348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-i386.exe >nul 2>&12⤵PID:1020
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-i386.exe3⤵
- Kills process with taskkill
PID:872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&12⤵PID:4032
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe3⤵
- Kills process with taskkill
PID:1016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-i386.exe >nul 2>&12⤵PID:1064
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-i386.exe3⤵
- Kills process with taskkill
PID:880
-
-
-
C:\Windows\SoftwareDistribution\Download\hU6KR.exe"C:\Windows\SoftwareDistribution\Download\hU6KR.exe" -map C:\Windows\SoftwareDistribution\Download\hU6KR.sys2⤵PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTP Debugger Windows Service (32 bit).exe >nul 2>&12⤵PID:1576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&12⤵PID:32
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumper.exe3⤵
- Kills process with taskkill
PID:220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:2644
-
C:\Windows\system32\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- Kills process with taskkill
PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im x64dbg.exe >nul 2>&12⤵PID:2072
-
C:\Windows\system32\taskkill.exetaskkill /f /im x64dbg.exe3⤵
- Kills process with taskkill
PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im x32dbg.exe >nul 2>&12⤵PID:4408
-
C:\Windows\system32\taskkill.exetaskkill /f /im x32dbg.exe3⤵
- Kills process with taskkill
PID:600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:660
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2028
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
PID:1296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2940
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
PID:2596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:2376
-
C:\Windows\system32\taskkill.exetaskkill /f /im Ida64.exe3⤵
- Kills process with taskkill
PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:2488
-
C:\Windows\system32\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- Kills process with taskkill
PID:2496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:60
-
C:\Windows\system32\taskkill.exetaskkill /f /im Dbg64.exe3⤵
- Kills process with taskkill
PID:4040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:3548
-
C:\Windows\system32\taskkill.exetaskkill /f /im Dbg32.exe3⤵
- Kills process with taskkill
PID:5036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im ida.exe >nul 2>&12⤵PID:1560
-
C:\Windows\system32\taskkill.exetaskkill /f /im ida.exe3⤵
- Kills process with taskkill
PID:5040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2988
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3252
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4124
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
PID:2724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im procexp.exe >nul 2>&12⤵PID:1436
-
C:\Windows\system32\taskkill.exetaskkill /f /im procexp.exe3⤵
- Kills process with taskkill
PID:2992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im procexp64.exe >nul 2>&12⤵PID:4088
-
C:\Windows\system32\taskkill.exetaskkill /f /im procexp64.exe3⤵
- Kills process with taskkill
PID:4748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im procexp64.exe >nul 2>&12⤵PID:1268
-
C:\Windows\system32\taskkill.exetaskkill /f /im procexp64.exe3⤵
- Kills process with taskkill
PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mafiaengine-i386.exe >nul 2>&12⤵PID:3760
-
C:\Windows\system32\taskkill.exetaskkill /f /im mafiaengine-i386.exe3⤵
- Kills process with taskkill
PID:3764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Mafia Engine.exe >nul 2>&12⤵PID:2960
-
C:\Windows\system32\taskkill.exetaskkill /f /im Mafia Engine.exe3⤵
- Kills process with taskkill
PID:4804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mafiaengine-x86_64.exe >nul 2>&12⤵PID:4864
-
C:\Windows\system32\taskkill.exetaskkill /f /im mafiaengine-x86_64.exe3⤵
- Kills process with taskkill
PID:5060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Tutorial-i386.exe >nul 2>&12⤵PID:4008
-
C:\Windows\system32\taskkill.exetaskkill /f /im Tutorial-i386.exe3⤵
- Kills process with taskkill
PID:4072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Tutorial-x86_64.exe >nul 2>&12⤵PID:1316
-
C:\Windows\system32\taskkill.exetaskkill /f /im Tutorial-x86_64.exe3⤵
- Kills process with taskkill
PID:4916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mafiaengine-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:796
-
C:\Windows\system32\taskkill.exetaskkill /f /im mafiaengine-x86_64-SSE4-AVX2.exe3⤵
- Kills process with taskkill
PID:508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&12⤵PID:1588
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumperClient.exe3⤵
- Kills process with taskkill
PID:792
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTP Debugger Windows Service (32 bit).exe1⤵
- Kills process with taskkill
PID:920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5083c6c05ac5875d0b6e997e894ca07bc
SHA169d0116998e8a70db5852fccb86d45975ce88a9a
SHA25603aefd40698cafbd48138784f362fb9a36f726fb50f262ca40695729f7b553ca
SHA512fb0b9994f9ddadd825476ed19a8299ef90536dae58b4f3087145ca4033a63d4ae0da944ac8bf4e71324e1b63af755ab1d82019e55de6377b00c9812ed57f3fdf
-
Filesize
260KB
MD5083c6c05ac5875d0b6e997e894ca07bc
SHA169d0116998e8a70db5852fccb86d45975ce88a9a
SHA25603aefd40698cafbd48138784f362fb9a36f726fb50f262ca40695729f7b553ca
SHA512fb0b9994f9ddadd825476ed19a8299ef90536dae58b4f3087145ca4033a63d4ae0da944ac8bf4e71324e1b63af755ab1d82019e55de6377b00c9812ed57f3fdf