Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 09:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ZeroPoint Injector_[unknowncheats.me]_.exe
Resource
win7-20230831-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ZeroPoint Injector_[unknowncheats.me]_.exe
Resource
win10v2004-20230915-en
1 signatures
150 seconds
General
-
Target
ZeroPoint Injector_[unknowncheats.me]_.exe
-
Size
48KB
-
MD5
57a764cfd6c71a1caf30c8dc71b89b75
-
SHA1
cec2bff7fb0e755f0c8b5523e5c1c21b5665b67f
-
SHA256
6650d4c7c631f101c2fce040f2aaffbc3eb3c10dd04d254c357f6946968e9528
-
SHA512
e426326bfb66cc4b832285ca73013d433b9ad083b50c444d17180c2eb85704623112910f1e95f53bc978abe6aded86350f729e132f40a9c1f7d9aca8faf70523
-
SSDEEP
768:HKOabAktHePvqQNOb3x10tpbyAzc9LRzBNxhioJSrUwm85GwZOB3rI7my:q1bAk+qQNOTGpWlzJD9+5GYaI7
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4140 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 88 PID 4260 wrote to memory of 4140 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 88 PID 4260 wrote to memory of 1876 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 89 PID 4260 wrote to memory of 1876 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 89 PID 4260 wrote to memory of 3540 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 91 PID 4260 wrote to memory of 3540 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 91 PID 4260 wrote to memory of 1320 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 92 PID 4260 wrote to memory of 1320 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 92 PID 4260 wrote to memory of 3148 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 93 PID 4260 wrote to memory of 3148 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 93 PID 4260 wrote to memory of 4456 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 94 PID 4260 wrote to memory of 4456 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 94 PID 4260 wrote to memory of 2172 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 95 PID 4260 wrote to memory of 2172 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 95 PID 4260 wrote to memory of 3120 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 97 PID 4260 wrote to memory of 3120 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 97 PID 4260 wrote to memory of 4892 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 98 PID 4260 wrote to memory of 4892 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 98 PID 4260 wrote to memory of 3060 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 100 PID 4260 wrote to memory of 3060 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 100 PID 4260 wrote to memory of 4088 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 103 PID 4260 wrote to memory of 4088 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 103 PID 4260 wrote to memory of 1100 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 105 PID 4260 wrote to memory of 1100 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 105 PID 4260 wrote to memory of 4764 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 107 PID 4260 wrote to memory of 4764 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 107 PID 4260 wrote to memory of 232 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 108 PID 4260 wrote to memory of 232 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 108 PID 4260 wrote to memory of 4288 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 110 PID 4260 wrote to memory of 4288 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 110 PID 4260 wrote to memory of 4600 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 111 PID 4260 wrote to memory of 4600 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 111 PID 4260 wrote to memory of 3792 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 112 PID 4260 wrote to memory of 3792 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 112 PID 4260 wrote to memory of 3932 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 115 PID 4260 wrote to memory of 3932 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 115 PID 4260 wrote to memory of 4704 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 116 PID 4260 wrote to memory of 4704 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 116 PID 4260 wrote to memory of 1672 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 117 PID 4260 wrote to memory of 1672 4260 ZeroPoint Injector_[unknowncheats.me]_.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZeroPoint Injector_[unknowncheats.me]_.exe"C:\Users\Admin\AppData\Local\Temp\ZeroPoint Injector_[unknowncheats.me]_.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1672
-