Analysis
-
max time kernel
9s -
max time network
10s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 15:25
Behavioral task
behavioral1
Sample
CheaterEYEpalLauncher.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
CheaterEYEpalLauncher.exe
-
Size
4.2MB
-
MD5
c6a0b261c9379bc98b9956c7542c3528
-
SHA1
117f6f4554186e37090ac500acd65800662950b8
-
SHA256
8b4106e1107606fdaedbd1a8b3fe36c5dbedb3042c7857185751b6070d80846b
-
SHA512
a3821a14a97613269fa384c38f58de12a3d167ed050b95bdb1a4bf1f108405b2127be5f8fdeec08042adf812db9464bda944062c6400d9f98a7bb9ff6ef452f5
-
SSDEEP
98304:RTqnTT/sKvY74mpvBY4x5eINNKGYLtpMOZafPX:RmTT/d24s5Yw5eCstq0UPX
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CheaterEYEpalLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CheaterEYEpalLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CheaterEYEpalLauncher.exe -
resource yara_rule behavioral1/memory/1720-0-0x000000013F740000-0x00000001401D7000-memory.dmp themida behavioral1/memory/1720-2-0x000000013F740000-0x00000001401D7000-memory.dmp themida behavioral1/memory/1720-3-0x000000013F740000-0x00000001401D7000-memory.dmp themida behavioral1/memory/1720-4-0x000000013F740000-0x00000001401D7000-memory.dmp themida behavioral1/memory/1720-5-0x000000013F740000-0x00000001401D7000-memory.dmp themida behavioral1/memory/1720-6-0x000000013F740000-0x00000001401D7000-memory.dmp themida behavioral1/memory/1720-7-0x000000013F740000-0x00000001401D7000-memory.dmp themida behavioral1/memory/1720-8-0x000000013F740000-0x00000001401D7000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CheaterEYEpalLauncher.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1720 CheaterEYEpalLauncher.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2976 1720 CheaterEYEpalLauncher.exe 29 PID 1720 wrote to memory of 2976 1720 CheaterEYEpalLauncher.exe 29 PID 1720 wrote to memory of 2976 1720 CheaterEYEpalLauncher.exe 29 PID 1720 wrote to memory of 3000 1720 CheaterEYEpalLauncher.exe 30 PID 1720 wrote to memory of 3000 1720 CheaterEYEpalLauncher.exe 30 PID 1720 wrote to memory of 3000 1720 CheaterEYEpalLauncher.exe 30 PID 3000 wrote to memory of 1216 3000 cmd.exe 31 PID 3000 wrote to memory of 1216 3000 cmd.exe 31 PID 3000 wrote to memory of 1216 3000 cmd.exe 31 PID 3000 wrote to memory of 2820 3000 cmd.exe 32 PID 3000 wrote to memory of 2820 3000 cmd.exe 32 PID 3000 wrote to memory of 2820 3000 cmd.exe 32 PID 3000 wrote to memory of 2604 3000 cmd.exe 33 PID 3000 wrote to memory of 2604 3000 cmd.exe 33 PID 3000 wrote to memory of 2604 3000 cmd.exe 33 PID 1720 wrote to memory of 2616 1720 CheaterEYEpalLauncher.exe 34 PID 1720 wrote to memory of 2616 1720 CheaterEYEpalLauncher.exe 34 PID 1720 wrote to memory of 2616 1720 CheaterEYEpalLauncher.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheaterEYEpalLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CheaterEYEpalLauncher.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\CheaterEYEpalLauncher.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\CheaterEYEpalLauncher.exe" MD53⤵PID:1216
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2820
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2616
-