General
-
Target
cheeto.exe
-
Size
4.0MB
-
Sample
240310-vaaw2agf9z
-
MD5
b82b409f4f461c6d7dc322628e17cb03
-
SHA1
7380d4bde69fb3d46436d6beac522b826fcfa409
-
SHA256
1d9a9975c321ddce889f12c6272940992f201d4862e252408f0016a60df56ce8
-
SHA512
cdb4983fc1d4941f8fbb59a4642001ec66f8889c1238989c652b7b6f4e29721520f8c54e377a6794c3418e9549e12609d7a482d774f14894f863798c3198f12b
-
SSDEEP
98304:w+m9yDaJOCOxWp0r5bX7fCRUYXXHym5dJoq:Nm9yyOxxWerp7eNnHh5boq
Behavioral task
behavioral1
Sample
cheeto.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cheeto.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
cheeto.exe
-
Size
4.0MB
-
MD5
b82b409f4f461c6d7dc322628e17cb03
-
SHA1
7380d4bde69fb3d46436d6beac522b826fcfa409
-
SHA256
1d9a9975c321ddce889f12c6272940992f201d4862e252408f0016a60df56ce8
-
SHA512
cdb4983fc1d4941f8fbb59a4642001ec66f8889c1238989c652b7b6f4e29721520f8c54e377a6794c3418e9549e12609d7a482d774f14894f863798c3198f12b
-
SSDEEP
98304:w+m9yDaJOCOxWp0r5bX7fCRUYXXHym5dJoq:Nm9yyOxxWerp7eNnHh5boq
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1