Overview
overview
5Static
static
3NetflixCE ...io.exe
windows7-x64
5NetflixCE ...io.exe
windows10-2004-x64
5NetflixCE ...ct.lua
windows7-x64
3NetflixCE ...ct.lua
windows10-2004-x64
3NetflixCE ...64.pot
windows7-x64
1NetflixCE ...64.pot
windows10-2004-x64
1NetflixCE ...ua.exe
windows7-x64
1NetflixCE ...ua.exe
windows10-2004-x64
1NetflixCE ...er.exe
windows7-x64
1NetflixCE ...er.exe
windows10-2004-x64
1Analysis
-
max time kernel
71s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
NetflixCE V4/NetflixCE/RobloxStudio.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NetflixCE V4/NetflixCE/RobloxStudio.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
NetflixCE V4/NetflixCE/autorun/DotNetInject.lua
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
NetflixCE V4/NetflixCE/autorun/DotNetInject.lua
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
NetflixCE V4/NetflixCE/languages/cheatengine-x86_64.pot
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
NetflixCE V4/NetflixCE/languages/cheatengine-x86_64.pot
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
NetflixCE V4/NetflixCE/lua_extra/lua.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
NetflixCE V4/NetflixCE/lua_extra/lua.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
NetflixCE V4/rbxfpsunlocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
NetflixCE V4/rbxfpsunlocker.exe
Resource
win10v2004-20240412-en
General
-
Target
NetflixCE V4/NetflixCE/languages/cheatengine-x86_64.pot
-
Size
237KB
-
MD5
8319dc1e7c2c2b5b66adf2a088dc8f1c
-
SHA1
8cba7064d859baa4875bcc22d9fd5b7b230fd9f9
-
SHA256
3bf0c50a35e924128ff5eeb7786260c37e08d44e759fc1c63d3f30ff6a744545
-
SHA512
8f1952a5122fd7bf34bc041f37b4ac2b940dc9128a52f9175c7f986a606c3b1e8f51879f0f394cfc9e6db51e43ab0c6a24cce0559cbed4498be9495d31fb0fbf
-
SSDEEP
3072:wY4EriDlRO2vY6qyih6yie4UI6x1bZCiLINMUVqKEZ:wY4EB6qyNe48MNM2qKEZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 3900 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
POWERPNT.EXEpid process 3900 POWERPNT.EXE 3900 POWERPNT.EXE 3900 POWERPNT.EXE 3900 POWERPNT.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\NetflixCE V4\NetflixCE\languages\cheatengine-x86_64.pot" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3900-0-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-1-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-2-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-3-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-5-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-6-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-4-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-7-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-8-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-10-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-9-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-11-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-12-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-14-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-13-0x00007FFB332F0000-0x00007FFB33300000-memory.dmpFilesize
64KB
-
memory/3900-15-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-16-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-17-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-18-0x00007FFB332F0000-0x00007FFB33300000-memory.dmpFilesize
64KB
-
memory/3900-19-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-20-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-22-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-21-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB
-
memory/3900-45-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-46-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-47-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-48-0x00007FFB35B50000-0x00007FFB35B60000-memory.dmpFilesize
64KB
-
memory/3900-49-0x00007FFB75AD0000-0x00007FFB75CC5000-memory.dmpFilesize
2.0MB