Overview
overview
3Static
static
3CheatMaker.exe
windows7-x64
3CheatMaker.exe
windows10-2004-x64
3Cheats/新...��.url
windows7-x64
1Cheats/新...��.url
windows10-2004-x64
1Languages/English.js
windows7-x64
1Languages/English.js
windows10-2004-x64
1Plugins/CP...ix.dll
windows7-x64
1Plugins/CP...ix.dll
windows10-2004-x64
1Plugins/Fu...ix.dll
windows7-x64
1Plugins/Fu...ix.dll
windows10-2004-x64
1Plugins/MD_Fix.dll
windows7-x64
1Plugins/MD_Fix.dll
windows10-2004-x64
1Plugins/Turn_Data.dll
windows7-x64
1Plugins/Turn_Data.dll
windows10-2004-x64
1Plugins/Ya...ix.dll
windows7-x64
1Plugins/Ya...ix.dll
windows10-2004-x64
1Update.exe
windows7-x64
3Update.exe
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
CheatMaker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CheatMaker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Cheats/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Cheats/新云软件.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Languages/English.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Languages/English.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Plugins/CPS3_Emu_Fix.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Plugins/CPS3_Emu_Fix.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
Plugins/Fusion_Fix.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Plugins/Fusion_Fix.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Plugins/MD_Fix.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Plugins/MD_Fix.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Plugins/Turn_Data.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Plugins/Turn_Data.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Plugins/Yabause_Fix.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Plugins/Yabause_Fix.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Update.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Update.exe
Resource
win10v2004-20231215-en
General
-
Target
CheatMaker.exe
-
Size
977KB
-
MD5
2ecb96153091d32afcb7d8db660d9997
-
SHA1
3717e06780aa1592ede71d4d8d898b75b22662ea
-
SHA256
00dd0b3169a1b61dcef889a41a37fceb0aa3e18db5a1ae538424f4a60a5b258f
-
SHA512
1bff0830390759ad6d6bdc1d50188b13ed7c75a9f28f9e2e0cb4a808856013b805081155b5487282b1974afbab680f6075d32585a9b0aedc18806d3b6f49a01b
-
SSDEEP
24576:Ss2ZDpE4pEEuuyLIr82LXIP5e1c6ufg5pzvMS0nlqMCFQ:t0Dj5kU10PU1c6ufipX00FQ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 3668 4896 WerFault.exe -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\open CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\print\command CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CHEATM~1.EXE /dde" CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmf\ShellNew CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CHEATM~1.EXE,1" CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\open\ddeexec CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\print\ddeexec CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\print\ddeexec\ = "[print(\"%1\")]" CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\DefaultIcon CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\open\ddeexec\ = "[open(\"%1\")]" CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\printto\ddeexec CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\open\command CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CHEATM~1.EXE /dde" CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\printto CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\printto\command CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmf CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmf\ShellNew\NullFile CheatMaker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.cmf\ShellNew CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CHEATM~1.EXE /dde" CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmf\ = "CheatMaker.cmf" CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\ = "CheatMaker Modifier File" CheatMaker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\print CheatMaker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatMaker.cmf\shell\printto\ddeexec\ = "[printto(\"%1\",\"%2\",\"%3\",\"%4\")]" CheatMaker.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1832 CheatMaker.exe 1832 CheatMaker.exe 1832 CheatMaker.exe 1832 CheatMaker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1832 CheatMaker.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1832 CheatMaker.exe 1832 CheatMaker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4896 1832 CheatMaker.exe 98 PID 1832 wrote to memory of 4896 1832 CheatMaker.exe 98 PID 1832 wrote to memory of 4896 1832 CheatMaker.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatMaker.exe"C:\Users\Admin\AppData\Local\Temp\CheatMaker.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Update.exeC:\Users\Admin\AppData\Local\Temp\Update.exe2⤵PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4896 -ip 48961⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 3761⤵
- Program crash
PID:3668