Analysis
-
max time kernel
138s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
CheatCheck.exe
Resource
win7-20231215-en
General
-
Target
CheatCheck.exe
-
Size
1.9MB
-
MD5
f5180bd1bede58236ddd37276403c888
-
SHA1
919b6b47635e81a1f0f2637f89902fc9563387cd
-
SHA256
e00d8a4b001935fb2c6cbedf9300e364ed6bdfd29158e04dbdedb018c4a6878a
-
SHA512
cebec5ea8762f1aaee9884a46d3cf7d7d138dfc25240f5da1216cdcfdc32d0f5f47b677674837b178735eec2794227c7af7a85352501e8387fa7e06c7d1a6244
-
SSDEEP
49152:62YU+sjELQXoeysHa6/3pKJz6lRusCofRVg6PJuL68l:62JT5G6/pKocsC6geJuG
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1205950589855473715/yMBp6zJGAY_8GNy4KCuGaBheW78ZyPBH6wBshmsyIHWe3bpwN-cogn3qrbzWQQLDF5nC
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral2/memory/4528-3-0x00000000001F0000-0x00000000006B4000-memory.dmp family_umbral behavioral2/memory/4528-4-0x00000000001F0000-0x00000000006B4000-memory.dmp family_umbral behavioral2/memory/4528-10-0x00000000001F0000-0x00000000006B4000-memory.dmp family_umbral -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CheatCheck.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CheatCheck.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CheatCheck.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Wine CheatCheck.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4528 CheatCheck.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 CheatCheck.exe 4528 CheatCheck.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4528 CheatCheck.exe Token: SeIncreaseQuotaPrivilege 1800 wmic.exe Token: SeSecurityPrivilege 1800 wmic.exe Token: SeTakeOwnershipPrivilege 1800 wmic.exe Token: SeLoadDriverPrivilege 1800 wmic.exe Token: SeSystemProfilePrivilege 1800 wmic.exe Token: SeSystemtimePrivilege 1800 wmic.exe Token: SeProfSingleProcessPrivilege 1800 wmic.exe Token: SeIncBasePriorityPrivilege 1800 wmic.exe Token: SeCreatePagefilePrivilege 1800 wmic.exe Token: SeBackupPrivilege 1800 wmic.exe Token: SeRestorePrivilege 1800 wmic.exe Token: SeShutdownPrivilege 1800 wmic.exe Token: SeDebugPrivilege 1800 wmic.exe Token: SeSystemEnvironmentPrivilege 1800 wmic.exe Token: SeRemoteShutdownPrivilege 1800 wmic.exe Token: SeUndockPrivilege 1800 wmic.exe Token: SeManageVolumePrivilege 1800 wmic.exe Token: 33 1800 wmic.exe Token: 34 1800 wmic.exe Token: 35 1800 wmic.exe Token: 36 1800 wmic.exe Token: SeIncreaseQuotaPrivilege 1800 wmic.exe Token: SeSecurityPrivilege 1800 wmic.exe Token: SeTakeOwnershipPrivilege 1800 wmic.exe Token: SeLoadDriverPrivilege 1800 wmic.exe Token: SeSystemProfilePrivilege 1800 wmic.exe Token: SeSystemtimePrivilege 1800 wmic.exe Token: SeProfSingleProcessPrivilege 1800 wmic.exe Token: SeIncBasePriorityPrivilege 1800 wmic.exe Token: SeCreatePagefilePrivilege 1800 wmic.exe Token: SeBackupPrivilege 1800 wmic.exe Token: SeRestorePrivilege 1800 wmic.exe Token: SeShutdownPrivilege 1800 wmic.exe Token: SeDebugPrivilege 1800 wmic.exe Token: SeSystemEnvironmentPrivilege 1800 wmic.exe Token: SeRemoteShutdownPrivilege 1800 wmic.exe Token: SeUndockPrivilege 1800 wmic.exe Token: SeManageVolumePrivilege 1800 wmic.exe Token: 33 1800 wmic.exe Token: 34 1800 wmic.exe Token: 35 1800 wmic.exe Token: 36 1800 wmic.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 1800 4528 CheatCheck.exe 84 PID 4528 wrote to memory of 1800 4528 CheatCheck.exe 84 PID 4528 wrote to memory of 1800 4528 CheatCheck.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatCheck.exe"C:\Users\Admin\AppData\Local\Temp\CheatCheck.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1800
-