Analysis

  • max time kernel
    142s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 23:08

General

  • Target

    CheatEngine75.exe

  • Size

    28.5MB

  • MD5

    8cef61e2080c38400698bc3265fd7f95

  • SHA1

    a174b7dd8bd1eacfa6a9accd878c16bdc8aa1936

  • SHA256

    cb73a9806e39e7c694cd79bbdb0fd3c836ec82810f6ded1852aa1ac9c7b3012c

  • SHA512

    81781fdb49a3b949725ff508a96eef01599ff90c2fd42f104dda311cfb37dfb90d4aa38d0d4694634c3a469fbdac4c7421a5aee99067536848bbc50bda4658cb

  • SSDEEP

    786432:0TCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFH:02EXFhV0KAcNjxAItj

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe
    "C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\is-9SMCO.tmp\CheatEngine75.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9SMCO.tmp\CheatEngine75.tmp" /SL5="$70120,29019897,780800,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
      2⤵
      • Checks for any installed AV software in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    2KB

    MD5

    7907ae4cb2481abceae540ccabd9fbc0

    SHA1

    6a029be5d72a9291feea4b91578fcb7b2c01b27c

    SHA256

    f79778ddaa5bef4bdc90259c144ef78478fb551624ac263fe3a3a9ec7140469c

    SHA512

    9c989b0b252722479500fe55b7d7d67551f69aaf482cfbc72e38cb4d78ae4936c55c800301f4f3d95e8163aa2e40baa9ef843f891b487aa9175d64463a559317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2af567fbbf73c4f45d3f36bce335e0cb

    SHA1

    44b835b45842349a3151904f442c5d43efa76cb6

    SHA256

    cd2f3d0d411d419038ae63fd14a1a1e248d9756571b99ff4cdb959d1af32f514

    SHA512

    7a1e4ea8f99039aac7aecae6b2b3ea1023c33f455771a5bfecba50dea54bf29d92e0c66d83981439af05a99ccfb2dc92dd31dbab31a8467737e0efb511dd4319

  • C:\Users\Admin\AppData\Local\Temp\Tar9489.tmp

    Filesize

    46KB

    MD5

    7b7c5b9b35f805fb8a2856c8d152fb54

    SHA1

    38f857ef2284354c79f68691605d340a5ab5d8b4

    SHA256

    aadc2cc4ae2545fdd2aa44f9a0e66b0eb9299448198eaabb298ee0182e9d2523

    SHA512

    9cbcab56188b7ec694c2c0dfa30331bf4ab35a9bf66071e959017bf9130157b1c66e784a68c95161e9802ec026c6f6f4568ae5486af26141ff0f3231e78867f0

  • C:\Users\Admin\AppData\Local\Temp\is-9SMCO.tmp\CheatEngine75.tmp

    Filesize

    88KB

    MD5

    8057c40aee4ca6fb320327bb00000182

    SHA1

    e059c5ac6005384e967332e6fff85501c65966c9

    SHA256

    32949e97426397dfa301e03df8bd31f2cf833bd593f019899dae44729755001c

    SHA512

    bc7bf37857ea1de9119d36f5ca46c9e6f5819c192d64ebc26f957e636b7f61186dccd44bb91a2b568c80282b03c93fc20ad5099f8380ab9b281ea747afb9e304

  • C:\Users\Admin\AppData\Local\Temp\is-C26OU.tmp\logo.png

    Filesize

    169KB

    MD5

    73ca9cb6cd7d9f2ab6d4fb826b333fe1

    SHA1

    8f6284ce5213ea84dcb32ef40c8ae54b96d696b6

    SHA256

    d23cdac8c5e088f1c18f0bafcabd9266ff2aba860dc4545169b924c5c7192c0d

    SHA512

    7c439e9c7f2cbfe72ff9d243cee01382d6e1e489de856c56c2971969ab35c1af026ee6fa0c3831b8dedd017003a194a38edcc02d56f1bf7e0f697084d79a1469

  • \Users\Admin\AppData\Local\Temp\is-9SMCO.tmp\CheatEngine75.tmp

    Filesize

    1KB

    MD5

    73bf4632485a49e3c56d71b612924503

    SHA1

    0d4c3b9c3b0edadc474e53cf042aae9e06d1ae6e

    SHA256

    3c0b2f49b7ad402aa3717fa95639e4547cf212552c7f1c230a5ff816d2c532ac

    SHA512

    6f3b0d929aaa65450eff72d5dcefc3bc7d99c14c548b45df37efe3898c494c1b4e9cef0a3ac87a7a7d95812ceb2368feed58a7b1b2c0f483713dc822d3dbbd74

  • \Users\Admin\AppData\Local\Temp\is-C26OU.tmp\zbShieldUtils.dll

    Filesize

    7KB

    MD5

    6526634aaa30de311ef17ee704d045b0

    SHA1

    6ef4cf7235f03de66eaf8b7e8f352418fae73fc8

    SHA256

    ec0acdfd3beea77f47a585e633be6066c3cedc677468a3424ccc6b6cabc2d36d

    SHA512

    727ff35a4ec1d900fb1b27ca82a012f3095dbee7ba11da0f00d37813b1e1c2d3b8d16eebf1ead5d24956fa2cfdf920bb69e6a83d0e4338942a2cbb212b510cc0

  • memory/2024-150-0x00000000033E0000-0x0000000003520000-memory.dmp

    Filesize

    1.2MB

  • memory/2024-140-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2024-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2024-151-0x00000000033E0000-0x0000000003520000-memory.dmp

    Filesize

    1.2MB

  • memory/2024-153-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2024-154-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2024-157-0x00000000033E0000-0x0000000003520000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-137-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2488-1-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB