Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
Cheat Engine.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Cheat Engine.exe
Resource
win10v2004-20230220-en
General
-
Target
Cheat Engine.exe
-
Size
459KB
-
MD5
bc28582086109675385f78332a5ff277
-
SHA1
45d9c5bfe5ae44c39402353a201dfd8c034d99b8
-
SHA256
11a1f0c071e43c99c5542df36b33d6204f23874070a2af65050125cf3e2d684b
-
SHA512
f35f5943f3ea776ad660799bfabc6f8c75736ba38ce5d69acbb9235e0ac5fba51e3469af19880f804b3351231ac743146356053943e33d2561602872aeb7e04c
-
SSDEEP
12288:zFUNDaPIBLMT7EgHRYGtUrdgugEnoSE55:zFOaPIBL4IgHR7tUrdgugEnoSE55
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 432 cheat engine.exe 4716 icsys.icn.exe 1068 explorer.exe 368 spoolsv.exe 4364 svchost.exe 228 spoolsv.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Cheat Engine.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 4716 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1068 explorer.exe 4364 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4156 Cheat Engine.exe 4156 Cheat Engine.exe 4716 icsys.icn.exe 4716 icsys.icn.exe 1068 explorer.exe 1068 explorer.exe 368 spoolsv.exe 368 spoolsv.exe 4364 svchost.exe 4364 svchost.exe 228 spoolsv.exe 228 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4156 wrote to memory of 432 4156 Cheat Engine.exe 85 PID 4156 wrote to memory of 432 4156 Cheat Engine.exe 85 PID 4156 wrote to memory of 432 4156 Cheat Engine.exe 85 PID 4156 wrote to memory of 4716 4156 Cheat Engine.exe 86 PID 4156 wrote to memory of 4716 4156 Cheat Engine.exe 86 PID 4156 wrote to memory of 4716 4156 Cheat Engine.exe 86 PID 4716 wrote to memory of 1068 4716 icsys.icn.exe 87 PID 4716 wrote to memory of 1068 4716 icsys.icn.exe 87 PID 4716 wrote to memory of 1068 4716 icsys.icn.exe 87 PID 1068 wrote to memory of 368 1068 explorer.exe 88 PID 1068 wrote to memory of 368 1068 explorer.exe 88 PID 1068 wrote to memory of 368 1068 explorer.exe 88 PID 368 wrote to memory of 4364 368 spoolsv.exe 89 PID 368 wrote to memory of 4364 368 spoolsv.exe 89 PID 368 wrote to memory of 4364 368 spoolsv.exe 89 PID 4364 wrote to memory of 228 4364 svchost.exe 90 PID 4364 wrote to memory of 228 4364 svchost.exe 90 PID 4364 wrote to memory of 228 4364 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cheat Engine.exe"C:\Users\Admin\AppData\Local\Temp\Cheat Engine.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
\??\c:\users\admin\appdata\local\temp\cheat engine.exe"c:\users\admin\appdata\local\temp\cheat engine.exe "2⤵
- Executes dropped EXE
PID:432
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:228
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5c4ef55773278a688ae60e7eaa3570b3b
SHA15158aea6873c3fad3211b5e0d95b22102f546de0
SHA2561b519a00b18d0639bad0274ac577032bba45ec7475e5701ca9d756d152ff1456
SHA5123e12b9d818910697233238592bf24d4a6915731532a8bc34840bc299f899ab891f5990805e53c8bea6025c29e0f6984edbd2d03380dab4056a444e642ee8a288
-
Filesize
135KB
MD5fbbf68d416f85ecfb7d4105adeb5594d
SHA1f9ef7c1037171a78b1ea52711a3c79a7e566addf
SHA256c384690314a56634f340db77d83249fa3eee5546fe4930caafa8800f58b4cfd8
SHA512144b01ffc59ea76f8eee250247f5f17a314d42214dad1316c39b2eb80ef3c04bfe8e4dd4a5762e2ac7c04ba82c08772c2b88d8501f23e9c69de7f7e7a77fc5c7
-
Filesize
135KB
MD5fbbf68d416f85ecfb7d4105adeb5594d
SHA1f9ef7c1037171a78b1ea52711a3c79a7e566addf
SHA256c384690314a56634f340db77d83249fa3eee5546fe4930caafa8800f58b4cfd8
SHA512144b01ffc59ea76f8eee250247f5f17a314d42214dad1316c39b2eb80ef3c04bfe8e4dd4a5762e2ac7c04ba82c08772c2b88d8501f23e9c69de7f7e7a77fc5c7
-
Filesize
135KB
MD5d15db04f299abe84215a758381406413
SHA1f49cffa03a77d414a0f077178f376776d281a961
SHA256987eb1303a52a2f4e27d8f51e328b84e96555a2fade87decd5f837ab06cade2b
SHA5121e3fb80b6df92bf633938d6380c4799e7061bb8fefb7301c97bf1025abed83f6bbf78a6d420b1ce42ecf09fb3c549243ac681f191ade5ccd057d5ce207ccc683
-
Filesize
135KB
MD5d15db04f299abe84215a758381406413
SHA1f49cffa03a77d414a0f077178f376776d281a961
SHA256987eb1303a52a2f4e27d8f51e328b84e96555a2fade87decd5f837ab06cade2b
SHA5121e3fb80b6df92bf633938d6380c4799e7061bb8fefb7301c97bf1025abed83f6bbf78a6d420b1ce42ecf09fb3c549243ac681f191ade5ccd057d5ce207ccc683
-
Filesize
135KB
MD598c5bd04e0f509b7f656ea8a828594fe
SHA1f34e0ed22da6928d7fdbd36473a797409cfe7abc
SHA256082af757d2e27aac69ac691f8d7c0733ba9a945998547b96e0cd136ea2f1d0fc
SHA5120718342dfa3220f543ae87cd50af21d2725fec647b469a69e0f9a2d97cf669a8cfb01f7227da379464401f9752225b5cb464901eca3b532d5975137df8b26283
-
Filesize
135KB
MD598c5bd04e0f509b7f656ea8a828594fe
SHA1f34e0ed22da6928d7fdbd36473a797409cfe7abc
SHA256082af757d2e27aac69ac691f8d7c0733ba9a945998547b96e0cd136ea2f1d0fc
SHA5120718342dfa3220f543ae87cd50af21d2725fec647b469a69e0f9a2d97cf669a8cfb01f7227da379464401f9752225b5cb464901eca3b532d5975137df8b26283
-
Filesize
135KB
MD5505c9e9be2f4e9abeb4fc127facf990b
SHA11a626e324d5f874d9e597e337a2f5688744e8ce9
SHA256f81d5861ca5af18586a84e1a68c3d08f580a2497b9a191683bd29b40fc175317
SHA512d0fecce4d38363ae241532fac483bfeff843be423d748bfd3af9aaf0379ac997e51772b64e947f5754261076a68a1204796406163ed8f047fac14909cb2f4b4a
-
Filesize
324KB
MD5c4ef55773278a688ae60e7eaa3570b3b
SHA15158aea6873c3fad3211b5e0d95b22102f546de0
SHA2561b519a00b18d0639bad0274ac577032bba45ec7475e5701ca9d756d152ff1456
SHA5123e12b9d818910697233238592bf24d4a6915731532a8bc34840bc299f899ab891f5990805e53c8bea6025c29e0f6984edbd2d03380dab4056a444e642ee8a288
-
Filesize
135KB
MD598c5bd04e0f509b7f656ea8a828594fe
SHA1f34e0ed22da6928d7fdbd36473a797409cfe7abc
SHA256082af757d2e27aac69ac691f8d7c0733ba9a945998547b96e0cd136ea2f1d0fc
SHA5120718342dfa3220f543ae87cd50af21d2725fec647b469a69e0f9a2d97cf669a8cfb01f7227da379464401f9752225b5cb464901eca3b532d5975137df8b26283
-
Filesize
135KB
MD5505c9e9be2f4e9abeb4fc127facf990b
SHA11a626e324d5f874d9e597e337a2f5688744e8ce9
SHA256f81d5861ca5af18586a84e1a68c3d08f580a2497b9a191683bd29b40fc175317
SHA512d0fecce4d38363ae241532fac483bfeff843be423d748bfd3af9aaf0379ac997e51772b64e947f5754261076a68a1204796406163ed8f047fac14909cb2f4b4a
-
Filesize
135KB
MD5fbbf68d416f85ecfb7d4105adeb5594d
SHA1f9ef7c1037171a78b1ea52711a3c79a7e566addf
SHA256c384690314a56634f340db77d83249fa3eee5546fe4930caafa8800f58b4cfd8
SHA512144b01ffc59ea76f8eee250247f5f17a314d42214dad1316c39b2eb80ef3c04bfe8e4dd4a5762e2ac7c04ba82c08772c2b88d8501f23e9c69de7f7e7a77fc5c7