Analysis

  • max time kernel
    15s
  • max time network
    23s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-09-2023 23:13

General

  • Target

    CS GO Cheat Injector/CS∶GO Cheat Injector.exe

  • Size

    38.8MB

  • MD5

    38b20a8a44bcca07232fe6f25adf25c9

  • SHA1

    4ac2a26cb8f27d790ddde8e658224da03828b9b8

  • SHA256

    3d18d98d31f508c79147204d8317c867dcffa8b6f919c1f4420744cce76c5fee

  • SHA512

    a7241ebb41ba9bb36d4a28dc94b5074b284badab8a1628bf08a1d18fc3bf1d23650abaf2c1b5b2cc66357eab8191225ec38ee6a3b054d746ac7b13bd7a557cf1

  • SSDEEP

    393216:TfbShKx8oFj/7TlyIWChy76hTZkPmOFS/HSSRhdSPAZrazqBBz:TbScx8Q/Bhyeh4XFS/pRheAp

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CS GO Cheat Injector\CS∶GO Cheat Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\CS GO Cheat Injector\CS∶GO Cheat Injector.exe"
    1⤵
    • Checks computer location settings
    PID:540
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4204
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4392
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    PID:4640
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:672
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\1PXO64G1\favicon[1].png

    Filesize

    958B

    MD5

    346e09471362f2907510a31812129cd2

    SHA1

    323b99430dd424604ae57a19a91f25376e209759

    SHA256

    74cf90ac2fe6624ab1056cacea11cf7ed4f8bef54bbb0e869638013bba45bc08

    SHA512

    a62b0fcc02e671d6037725cf67935f8ca1c875f764ce39fed267420935c0b7bad69ab50d3f9f8c628e9b3cff439885ee416989e31ceaa5d32ae596dd7e5fedbd

  • memory/540-8-0x0000000007B20000-0x0000000007B42000-memory.dmp

    Filesize

    136KB

  • memory/540-7-0x0000000008DE0000-0x0000000009130000-memory.dmp

    Filesize

    3.3MB

  • memory/540-3-0x0000000007FA0000-0x000000000857E000-memory.dmp

    Filesize

    5.9MB

  • memory/540-4-0x0000000007360000-0x00000000073F2000-memory.dmp

    Filesize

    584KB

  • memory/540-9-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/540-6-0x0000000007320000-0x000000000732A000-memory.dmp

    Filesize

    40KB

  • memory/540-2-0x00000000074C0000-0x00000000079BE000-memory.dmp

    Filesize

    5.0MB

  • memory/540-1-0x0000000000030000-0x00000000026FE000-memory.dmp

    Filesize

    38.8MB

  • memory/540-5-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/540-0-0x0000000073CE0000-0x00000000743CE000-memory.dmp

    Filesize

    6.9MB

  • memory/540-47-0x0000000073CE0000-0x00000000743CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4204-45-0x00000168A7760000-0x00000168A7762000-memory.dmp

    Filesize

    8KB

  • memory/4204-26-0x00000168A7500000-0x00000168A7510000-memory.dmp

    Filesize

    64KB

  • memory/4204-10-0x00000168A6C20000-0x00000168A6C30000-memory.dmp

    Filesize

    64KB

  • memory/4204-254-0x00000168AD2B0000-0x00000168AD2B1000-memory.dmp

    Filesize

    4KB

  • memory/4204-255-0x00000168AD2C0000-0x00000168AD2C1000-memory.dmp

    Filesize

    4KB

  • memory/4624-220-0x00000196F6A00000-0x00000196F6B00000-memory.dmp

    Filesize

    1024KB

  • memory/4624-234-0x00000196F7AC0000-0x00000196F7AC2000-memory.dmp

    Filesize

    8KB

  • memory/4624-236-0x00000196F7AE0000-0x00000196F7AE2000-memory.dmp

    Filesize

    8KB

  • memory/4624-238-0x00000196F8040000-0x00000196F8042000-memory.dmp

    Filesize

    8KB

  • memory/4624-240-0x00000196F80F0000-0x00000196F80F2000-memory.dmp

    Filesize

    8KB

  • memory/4624-242-0x00000196F8110000-0x00000196F8112000-memory.dmp

    Filesize

    8KB

  • memory/4624-244-0x00000196F8130000-0x00000196F8132000-memory.dmp

    Filesize

    8KB

  • memory/4624-246-0x00000196F8150000-0x00000196F8152000-memory.dmp

    Filesize

    8KB

  • memory/4624-248-0x00000196F8170000-0x00000196F8172000-memory.dmp

    Filesize

    8KB

  • memory/4624-228-0x00000196F77E0000-0x00000196F77E2000-memory.dmp

    Filesize

    8KB

  • memory/4624-226-0x00000196F7740000-0x00000196F7742000-memory.dmp

    Filesize

    8KB

  • memory/4624-224-0x00000196F76E0000-0x00000196F76E2000-memory.dmp

    Filesize

    8KB