Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe
Resource
win10v2004-20231215-en
General
-
Target
[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe
-
Size
1012KB
-
MD5
39b6e3adc1161b281a22d29c9e7b282e
-
SHA1
1b16d3d87f8b46b4f6651e677e89a4ee50f7c96d
-
SHA256
21edd1d694dfcbdf730d6b64440110d5d029aab244a7f066ec8c919cb4083f22
-
SHA512
164de7f8b4a35474405a22623f07ecb4191c750a2a70f319f5ec494107eb7ae2223b115d4fefafc31b2908b0e6c9d4b2e38d103106bdad596f99fec5fc3dee5c
-
SSDEEP
24576:Dy10YR1aFnFhlUTcQ8KY03dh1I66J6gGtTGFwH+LJVF:W10i8Tlif3dzIsVGye1VF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2516 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp -
Loads dropped DLL 6 IoCs
pid Process 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 2516 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp 2516 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp 2516 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp 2516 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp 2516 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\N: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\Z: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\A: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\J: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\K: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\M: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\Y: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\D: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\L: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\Q: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\T: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\E: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\O: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\P: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\U: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\R: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\V: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\X: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\G: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\H: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\I: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\F: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\S: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp File opened (read-only) \??\W: [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2516 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 28 PID 2392 wrote to memory of 2516 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 28 PID 2392 wrote to memory of 2516 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 28 PID 2392 wrote to memory of 2516 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 28 PID 2392 wrote to memory of 2516 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 28 PID 2392 wrote to memory of 2516 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 28 PID 2392 wrote to memory of 2516 2392 [FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe"C:\Users\Admin\AppData\Local\Temp\[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\is-MF1UI.tmp\[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp"C:\Users\Admin\AppData\Local\Temp\is-MF1UI.tmp\[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.tmp" /SL5="$400F4,664205,103936,C:\Users\Admin\AppData\Local\Temp\[FreeTP.Org]Cuphead-Multiplayer-Fix-Online.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5abd301b0263b0e0cebdd71e4855ac7d3
SHA11e8480c3f3b47a5daa7cb1183b6a7a49998cda6e
SHA256aff003e75bbf410ed2f7ca8728afe01ab4a517536647ad20109d00c4adf570d5
SHA512b5abb188bd23d7fc2e3253a5639cc3eba6d21774dba55b43395cf84ddb49fe707ad54dc0a7f157e6b0804c1662d9c4cb4bef2787aafb194ea73fbebd1a63bb6b
-
Filesize
9KB
MD580f54f431ea1dd2d7b90fa27f75142fe
SHA1ef4e7c38c435392ba212df3b5b2c7a601589236a
SHA256a41880120183128f5238b6cb8f8bc27f8e6bc022b4daaeb1722bf45e6b6f473c
SHA5125e5c9aeac2e2f44a6a3f6dcbb8b18958bdc8ffbd490b72df44806ae872d00c09e59db95b24608d08bc1541d72e24d7c4e1ed0c8d4285d312d531e8b10500e36d
-
Filesize
2KB
MD5f768e9aa3545815b6edf0fb4ce78424f
SHA1b3a4ed0b197bcab071b2921974fa67f7aec040e6
SHA25656983e8150bb1d01edb5b1a557dc5e462d7f5896bc0ff4a689468ccc22d95290
SHA512c164d40b977202a683fefeb77769bf3b4ced6c3a6d658a31a8c04a62667096e73c383fb735833e56afc1afa72ec3c650eb2f54501cd995a8db995491500c01fa
-
Filesize
9KB
MD5d2018cfab20b6385a80ef24100267cac
SHA148a68364270eb8fc8cb15e9d20a32befce85a297
SHA25690649334d9d905558e337c6fd329624201bb0be037ee67f7555e5ada8ce49c96
SHA51291fd1457a2388696ee6072e9c5943d0ae4d69d211301046d9043587680c7f918ac0205e13e8820afad5129d51b7ba70fb323684d31aa1ea26568b54abd475106
-
Filesize
6KB
MD56055fd19d5e3b49eb5f0f55562ea06a4
SHA1ff95363ef44675b4d5c3b0027729823f197cc75c
SHA2560fd936944e6d3858d5e5aa5c1c9314db33d9ad8f02fead4bfa2e180651446c0b
SHA512fe9df58e43b424511f85b3d559ec7cc5d3e8117774ac6418d60a599b58032af40b4b6ecaa0a292073dc4dbc2d68c853b02adb6752c843c99949d6e11ac0e19f6
-
Filesize
3KB
MD558eb6eb8adac870b56618abcd9c692d4
SHA120b5b5dc01a5f032cbcd0591554bf2bbc9b0e8dc
SHA256e7aba4c280e60c5a73cd26884b60e7fc80198937a387038e79138a843edae88e
SHA512cbb304457511671a4c9de36b9d41da2524f2d0b812d3b358ff49f85a74f4ddb5d42a80f97e77d59e87c718e8ae03731312bab00eee9d4e15b543fe45ccfe7b98
-
Filesize
3KB
MD5cd08b361b65c2648bfb126f484cf5758
SHA1c511e18c983ffeb124304e22d73d42570addfb6e
SHA256e7d74579124827e5755db4fab05de00a2d13e423e5839975689a8ff139100f70
SHA5124945937e0295e93095339ea688c5ad0c9441cae63d4ee4fc1b930a0b3aafea181f15703724dcf3bc398e1af801ad14f68f22e1a4c327513caf5a020c3ea2b1e6
-
Filesize
2KB
MD5f2aee70ab599118ee287f67e22870308
SHA198b2d97e7f4c48dd515f39fac620662d1f694d9d
SHA256920ad3ca8f47257d4e93f240e3056c86e93f0f8c03d93ff44b9beafc0114d059
SHA5125fabb309df438e99a4f3fd2057077c2ee2d4c4a8f642ea4ec35b42b986e368c92d2819b39cbc6c39083e8230748cc7d86f6a47a85f9f9d74bba6c04ed53d9082
-
Filesize
2KB
MD5567fe80ce090119956df8cc152930cf2
SHA19f7af3c9f910b9ce55aba54f2b67038d4cbfc7b9
SHA2566b4b64cfa24b8b040b8f6ceb3553007609b0c3d46b7202acc7fb6d0cb8603986
SHA512bf07c1f8bd359d7fa46625e4b6234c4b120c64525e64cc598e5bd475c4301dccf9f94155aed0c83e573cd11fb0410e528f63bfeeb068c80b2fc2f43783f78bc0
-
Filesize
62KB
MD5b91658597f15d7f689c86f5a2e7824bd
SHA100da609aa0b39140b767a3bc2644433d64edbd71
SHA256b3cda6ab45ad5aa6a0a5f700d2c8987b3c1c1ebda63165d9bd5a566b24dcbd84
SHA51200b287fb14b947edf4b16d52243e9a992595d8894e83d8590473103d1b54a4670b323db13c4f78234617c44f905baf517e68fcceaad313f3ea7cd44cf036daea
-
Filesize
4KB
MD5ad51d489414a6aa5fd0ac0da685e1ed9
SHA14dd60c089f5672584c928062e501ef426ac60710
SHA2568223cf843e17737a250b81694a0be381046ed3c7f78095d27a888636f089ec49
SHA5129043b170e2097e8cd78cfe02d9c9a46a2c72136b9582bfc0dc3518af69bf76eb4015cb95c22d122df804e1f116e4448c5524c2d5c8dfd4f7b7c269b6f6a975e2
-
Filesize
12KB
MD551af4120d6d22b1126cc87a5143740ef
SHA11cb4e91e765537a72c9628056d29fbd6a7ce515c
SHA256c74fed62141f7e666379a0b00d5b39c86975332cf08151cbe8cab88eff2c393c
SHA5122595be954684ca34bc9284337524a5191c72fbea46b59555a5113ed8404a1e7ab6c2aa0f5a975f832cccdd8934ff1140c679ecd940f31cc14b4c3a362a225cbc
-
Filesize
53KB
MD5f098bd91d349042d34dcded1ae89c859
SHA1ebb417ba2095cc29b2ff8cfd30c00048d8abb361
SHA2568f8cc7990f61478edd8429fdf71d323a277a9ee90a52a613deb5ae6959943af0
SHA512bcacf9b289dfd325dfc5b1742734ead6036b0e194ef57f49208354d9a2887d2eef777f73e0e8eaf1fcc21cb8c8f1fe6ca2bfecca4f77c972d2e3abf56a2a25c5
-
Filesize
434KB
MD5131773cba3aeef4bb0a90b9e1494a5aa
SHA1e3402001e5463ff633dfc66ec52f4ccf0aa67322
SHA2569764fa57bfae209b9df57c4a0726fc982986788f05e5ac2c445bfe43ab0a842b
SHA51284f0ed13a41a62dcde89fd138f62ff936195fcb7d3409b39f922d14738ab86810d7a09890d2e1d6fc5cb1e78a21e7c230cabbcc1360dfcb4fc633fc2ed8216aa
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
32KB
MD5295832fa6400cb3407cfe84b06785531
SHA17068910c2e0ea7f4535c770517e29d9c2d2ee77b
SHA25613e372c4d843603096f33603915c3f25d0e0d4475001c33ce5263bfcd1760784
SHA51250516f9761efd14641f65bd773cfdd50c4ab0de977e094ba9227796dc319d9330321c7914243fc7dc04b5716752395f8dac8ccdfdb98ba7e5f5c1172408ce57b
-
Filesize
76KB
MD52e35d2894df3b691dbd8e0d4f4c84efc
SHA1d0fc14963e397d185e9f2d7dea1d07bc6308d5b9
SHA256869079ba362cbc560d673db290248ec2aa075a74f22a82d90621f1118f8e1c4d
SHA51229ba662ab2e77aef0547ff76213a1b6ef52be27a446923790a27cf8b69377621048387dbb9f22001b6d15837dddada84c7350614ec9622258319658822705f90
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
467KB
MD5967cae7bcc9534b702330207ffbe75ef
SHA16fd7ef37c0438478a272f0d070dc454b4fb83c1b
SHA25653ae9696cf6cc8fe0aa01a5a648a8ce3307b28a79a019c6a609db5c56fd70f18
SHA512e00500cbfceaef32cf376182175c644c532991fca556c689d16dd8403e9c580863ee94eee00726b1c3e332da681d5062467ebf82a7a40e95b4701b00fbb32ec2