Analysis

  • max time kernel
    82s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 16:30

General

  • Target

    Kinky_PUBGM_Cheat.exe

  • Size

    11.9MB

  • MD5

    3b2a5f25e230d22e2193d0b9fe817952

  • SHA1

    fea199e51e2d2a05e41a15d3a36933f2ffd23274

  • SHA256

    da4a44e6a32525edbe1dc1e36c27baa7b6ee755f0dec3cbad2da1ffdb2dbf821

  • SHA512

    d75efba879f22a8da3998d6a4903a4f799874e0fb955151f40a0386e570d3198d95c8d2fa3dc223025ffcd06a04736075f3e46dc8b60554610506dbff2d0dbc2

  • SSDEEP

    196608:RZWNWwDbWWpgx+2zmhMNIiKXwBBR89+lK7JU/x/rHe+tnDHsakSdlhMMQguDB8Ro:RZqWuRpL2z+nXwBDlK7QJr++xLY+tRIl

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 61 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\werfault.exe
    werfault.exe /h /shared Global\d1bacd051e1a4e9892dc40e85b3709b3 /t 3208 /p 3132
    1⤵
      PID:4964
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        2⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4252
    • C:\Users\Admin\AppData\Local\Temp\Kinky_PUBGM_Cheat.exe
      "C:\Users\Admin\AppData\Local\Temp\Kinky_PUBGM_Cheat.exe"
      1⤵
        PID:1816
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2276
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2068
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3808
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4636
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:4904

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                82b066a0c26e9c3c026d421e012a093e

                SHA1

                2e4493ff239034dd93befa48a286616fa1222526

                SHA256

                a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                SHA512

                4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                82b066a0c26e9c3c026d421e012a093e

                SHA1

                2e4493ff239034dd93befa48a286616fa1222526

                SHA256

                a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                SHA512

                4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                82b066a0c26e9c3c026d421e012a093e

                SHA1

                2e4493ff239034dd93befa48a286616fa1222526

                SHA256

                a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                SHA512

                4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

              • memory/1140-4-0x00000000040E0000-0x00000000040E1000-memory.dmp

                Filesize

                4KB

              • memory/2068-11-0x000001F350640000-0x000001F350660000-memory.dmp

                Filesize

                128KB

              • memory/2068-13-0x000001F350620000-0x000001F350640000-memory.dmp

                Filesize

                128KB

              • memory/2068-15-0x000001F350950000-0x000001F350970000-memory.dmp

                Filesize

                128KB

              • memory/3808-29-0x0000028ABFA60000-0x0000028ABFA80000-memory.dmp

                Filesize

                128KB

              • memory/3808-31-0x0000028ABFA20000-0x0000028ABFA40000-memory.dmp

                Filesize

                128KB

              • memory/3808-33-0x0000028ABFE30000-0x0000028ABFE50000-memory.dmp

                Filesize

                128KB

              • memory/4252-39-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-49-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-51-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-50-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-52-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-53-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-54-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-55-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-38-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4252-36-0x00000258CC8F0000-0x00000258CC8F1000-memory.dmp

                Filesize

                4KB

              • memory/4636-63-0x000002CCA5A60000-0x000002CCA5A80000-memory.dmp

                Filesize

                128KB

              • memory/4636-67-0x000002CCA5E20000-0x000002CCA5E40000-memory.dmp

                Filesize

                128KB

              • memory/4636-65-0x000002CCA5A20000-0x000002CCA5A40000-memory.dmp

                Filesize

                128KB