Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/07/2023, 15:53

General

  • Target

    CheatEngine75P.exe

  • Size

    26.3MB

  • MD5

    124e5ba725b21e8b9efc27a94a7c0e6b

  • SHA1

    0c94aad1ba26b9f49814b949433488c7a2004054

  • SHA256

    bc37bba7efe232feebe23a7152f8a7407e5f868e771a46bf67106e70f295cbc4

  • SHA512

    a5260695ea7a27ad6a060809647fff447f51f8cec19f91568c37f4cc66278547fc41bb7c6b9f390c5d8f11f63df4c267b6e2cc0c56a87b363d9847bd945dfbb6

  • SSDEEP

    786432:4ru6+EORu4HYTd1AEtHYzENmuF7oUNUQWQu7bZmhxZTtU:4coJTd1dtHkENvhoLXQNTu

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheatEngine75P.exe
    "C:\Users\Admin\AppData\Local\Temp\CheatEngine75P.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\is-AC9RC.tmp\CheatEngine75P.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AC9RC.tmp\CheatEngine75P.tmp" /SL5="$1001E0,26635706,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75P.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1028
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1676
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4000
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:240
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4792
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2044
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4148
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4252
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3848
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T5JYCXSS\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\8R98QHVZ\www.patreon[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\COOUQA47\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\ZTERYRA6\favicon-32x32[1].png

    Filesize

    590B

    MD5

    64ae284a42cf270c40fb347f9284223b

    SHA1

    a4025efcf0b0e40fc5d04f8634e96a6de4865e13

    SHA256

    4f60efe171fbc9440652105f804491ddbe7210b46267c52ce85223d7d5ab1279

    SHA512

    2d1fbf8d308fc9fe82589797b518b0f8b67ded192ad2ce547208a095d1dbca15c1be3a55e016593d0e111a0faf5edbe9187a8d3f554833933a691a2d5e30cdcb

  • C:\Users\Admin\AppData\Local\Temp\is-AC9RC.tmp\CheatEngine75P.tmp

    Filesize

    3.1MB

    MD5

    ce748c0283fa3fdbb974580ad37c6e71

    SHA1

    40118bd5160d4b9cfba97d51fd842a9421203111

    SHA256

    4f807664e75665e2f4b46183327ce0125a9fc1d4e38f55a42113ecfa5c519847

    SHA512

    4beafc83f4808bec3026b158ee11b3de8976e510d24a1b330cd01d9e864c11b11cee56b0f740e1c296be4ee572a3e63529c041503e9c46f17d805953a7d93f00

  • \Users\Admin\AppData\Local\Temp\is-10C0S.tmp\pcheck.dll

    Filesize

    347KB

    MD5

    5663d99464c96a2677bf7a37efbead5d

    SHA1

    270520e3b3a30232109887213d25972c37677d3d

    SHA256

    cab93d088904265378f94b9a3ad7f2f93480b4c3f645bd1627b259f0cffb5fa8

    SHA512

    521ff832f662d4458114d17ffc7ae4e0bc66cbd06d2a676fb02acbf94cb8e86ba62aa7fe3901adac284080cebc5451750b91b7be3dd5422e1ef8a23603141a02

  • memory/1028-131-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/1028-408-0x0000000000400000-0x000000000071B000-memory.dmp

    Filesize

    3.1MB

  • memory/1028-130-0x0000000000400000-0x000000000071B000-memory.dmp

    Filesize

    3.1MB

  • memory/1028-123-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/1676-137-0x0000022606B20000-0x0000022606B30000-memory.dmp

    Filesize

    64KB

  • memory/1676-153-0x0000022607300000-0x0000022607310000-memory.dmp

    Filesize

    64KB

  • memory/1676-172-0x0000022606D40000-0x0000022606D42000-memory.dmp

    Filesize

    8KB

  • memory/1676-484-0x000002260D1A0000-0x000002260D1A1000-memory.dmp

    Filesize

    4KB

  • memory/1676-480-0x000002260D190000-0x000002260D191000-memory.dmp

    Filesize

    4KB

  • memory/2044-391-0x0000025B41920000-0x0000025B41A20000-memory.dmp

    Filesize

    1024KB

  • memory/2044-446-0x0000025B42F00000-0x0000025B43000000-memory.dmp

    Filesize

    1024KB

  • memory/2044-378-0x0000025B3E460000-0x0000025B3E480000-memory.dmp

    Filesize

    128KB

  • memory/2044-411-0x0000025B3EAF0000-0x0000025B3EAF2000-memory.dmp

    Filesize

    8KB

  • memory/2044-418-0x0000025B42A90000-0x0000025B42A92000-memory.dmp

    Filesize

    8KB

  • memory/2044-423-0x0000025B42AC0000-0x0000025B42AC2000-memory.dmp

    Filesize

    8KB

  • memory/2044-427-0x0000025B42AD0000-0x0000025B42AD2000-memory.dmp

    Filesize

    8KB

  • memory/2044-434-0x0000025B42AF0000-0x0000025B42AF2000-memory.dmp

    Filesize

    8KB

  • memory/2044-345-0x0000025B3E870000-0x0000025B3E970000-memory.dmp

    Filesize

    1024KB

  • memory/2044-208-0x0000025B3CDC0000-0x0000025B3CDC2000-memory.dmp

    Filesize

    8KB

  • memory/2044-339-0x0000025B3E820000-0x0000025B3E840000-memory.dmp

    Filesize

    128KB

  • memory/2044-212-0x0000025B3D2A0000-0x0000025B3D2A2000-memory.dmp

    Filesize

    8KB

  • memory/2044-210-0x0000025B3CDE0000-0x0000025B3CDE2000-memory.dmp

    Filesize

    8KB

  • memory/2044-509-0x0000025B43220000-0x0000025B43222000-memory.dmp

    Filesize

    8KB

  • memory/2044-542-0x0000025B43950000-0x0000025B43952000-memory.dmp

    Filesize

    8KB

  • memory/2044-546-0x0000025B439F0000-0x0000025B439F2000-memory.dmp

    Filesize

    8KB

  • memory/4092-118-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4092-128-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB