Overview
overview
7Static
static
39c3d6192ba...d4.exe
windows7-x64
39c3d6192ba...d4.exe
windows10-2004-x64
7$TEMP/gikW...EC.exe
windows7-x64
1$TEMP/gikW...EC.exe
windows10-2004-x64
1Users/�...re.dll
windows7-x64
1Users/�...re.dll
windows10-2004-x64
1Users/�...UI.dll
windows7-x64
1Users/�...UI.dll
windows10-2004-x64
1Users/�...nds.js
windows7-x64
1Users/�...nds.js
windows10-2004-x64
1Users/�...at.exe
windows7-x64
1Users/�...at.exe
windows10-2004-x64
1Users/�...is.dll
windows7-x64
1Users/�...is.dll
windows10-2004-x64
1Users/�...eel.js
windows7-x64
1Users/�...eel.js
windows10-2004-x64
1Users/�...ci.dll
windows7-x64
1Users/�...ci.dll
windows10-2004-x64
1Users/�...up.msi
windows7-x64
1Users/�...up.msi
windows10-2004-x64
1Analysis
-
max time kernel
88s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
9c3d6192ba68e46624894e4f0136d8d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c3d6192ba68e46624894e4f0136d8d4.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$TEMP/gikWp/rdxYDEC.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$TEMP/gikWp/rdxYDEC.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Users//Desktop//WMPDMCCore.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Users//Desktop//WMPDMCCore.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Users//Desktop//WMPNSSUI.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Users//Desktop//WMPNSSUI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Users//Desktop//bot/Battlegrounds.js
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Users//Desktop//bot/Battlegrounds.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Users//Desktop//cheat.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Users//Desktop//cheat.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Users//Desktop//mpvis.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Users//Desktop//mpvis.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Users//Desktop//topmon/LookNFeel.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Users//Desktop//topmon/LookNFeel.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Users//Desktop//wmpnssci.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Users//Desktop//wmpnssci.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Users///setup.msi
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Users///setup.msi
Resource
win10v2004-20231215-en
General
-
Target
Users//Desktop//cheat.exe
-
Size
912KB
-
MD5
44c1cb979c80e44425ab832b522a463f
-
SHA1
ed41bc52f274b77f6f121a80a3dfb3db106fc8e9
-
SHA256
b8ca44ea4c176fb6b589b0b08ddb1de58f5eb87fd9d9fc2be08c91781447fdd4
-
SHA512
ec878a109a8248830f1d95a59103321b6652ef429d0ab523d5e77a1082c05d2faed828a6e9c36ba7f4bc3f543b6aa53a220585d03f304b131fce67fcb4d0e22a
-
SSDEEP
12288:ZnLnAunl6qtjdfn+fvA4KEe8poxciB7ULSdy1vlmeHISSMnMQ5dHhU:lLAunxtVntPBxcieSdy1vXSMnMQVU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 cheat.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 cheat.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 5c00000001000000040000000008000019000000010000001000000045ed9bbc5e43d3b9ecd63c060db78e5c03000000010000001400000002faf3e291435468607857694df5e45b6885186868000000010000000800000000409120d035d9017e0000000100000008000000000063f58926d7011d000000010000001000000006f9583c00a763c23fb9e065a3366d55140000000100000014000000adbd987a34b426f7fac42654ef03bde024cb541a620000000100000020000000687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff20b00000001000000260000005300650063007400690067006f0020002800410064006400540072007500730074002900000053000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000001400000009b9105c5bba24343ca7f341c624e183f6ee7c1b0400000001000000100000001d3554048578b03f42424dbf20730a3f20000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 cheat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 3036 dw20.exe Token: SeBackupPrivilege 3036 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3196 wrote to memory of 3036 3196 cheat.exe 84 PID 3196 wrote to memory of 3036 3196 cheat.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Users\\Desktop\\cheat.exe"C:\Users\Admin\AppData\Local\Temp\Users\\Desktop\\cheat.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 17282⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3036
-