Analysis

  • max time kernel
    50s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    27/04/2024, 23:27

General

  • Target

    Cruelty Squad Save Editor-3-8-0-0-0-1702875251.exe

  • Size

    5.3MB

  • MD5

    24141fa331861fc9578e208765defe49

  • SHA1

    1ec7a747de3b6090e51dbe3353199c945d51d02c

  • SHA256

    732d830685e85cad06ef9be73ad9a4eda502cecc40f791edf8470a740176be23

  • SHA512

    87576fee229ea63a18f537421eba7725e6bee579935d7a3dee4151ced31bf543428a0d7d452224be443924dec9ce50be7c0f3c617d008b8510f9a80e05f248ce

  • SSDEEP

    98304:kvuM8XQ/pi65sn6Wfz7pnxJaWlpx1dstaNoSwKHfor2ZF9hPQFDoCHTY9pakAql:kw0DOxJlpZstQoS9Hfor2RhYl0zah

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cruelty Squad Save Editor-3-8-0-0-0-1702875251.exe
    "C:\Users\Admin\AppData\Local\Temp\Cruelty Squad Save Editor-3-8-0-0-0-1702875251.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Users\Admin\AppData\Local\Temp\Cruelty Squad Save Editor-3-8-0-0-0-1702875251.exe
      "C:\Users\Admin\AppData\Local\Temp\Cruelty Squad Save Editor-3-8-0-0-0-1702875251.exe"
      2⤵
      • Loads dropped DLL
      PID:1384
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5a73ab58,0x7ffb5a73ab68,0x7ffb5a73ab78
      2⤵
        PID:2824
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:2
        2⤵
          PID:1912
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:8
          2⤵
            PID:3744
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2276 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:8
            2⤵
              PID:812
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:1
              2⤵
                PID:3776
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:1
                2⤵
                  PID:3824
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3628 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:1
                  2⤵
                    PID:4324
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3944 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:8
                    2⤵
                      PID:4524
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4492 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:8
                      2⤵
                        PID:4156
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:8
                        2⤵
                          PID:2100
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4832 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:8
                          2⤵
                            PID:4792
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1892,i,13574477090427529002,14964217750108622094,131072 /prefetch:8
                            2⤵
                              PID:3832
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:1996

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              354B

                              MD5

                              7e7136b880a24fc8c51930e3ff7fd158

                              SHA1

                              adbb755159d8f8539d1eff75f11b30b757c3327d

                              SHA256

                              92f19df40c7a6f360ae2f9256ce43ee36a31ee050f63f45ce6c75bb41da37364

                              SHA512

                              4aa397bc79ab41bb182246035359832fed1f8e73e603cbe1f36f7ff984cb63e963dcecdc408bcbb3de7707f74de0946badf73b4a4f4a6a0eb78bf71ee79e71ca

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              874d0e28f1f783e17289586b9ae8a983

                              SHA1

                              5769dbd56c976fdb113d79cb4d098533d33a2aa4

                              SHA256

                              98a473f91683ae7673453f7ece9ebbd7e9016a9700003c43e094011e3a614802

                              SHA512

                              ea8e809ebf27d3b9c638aab9278e7db9f47f4647b3e1a08e432d69c83204ccc07f753b931f03c1054424c39084b93900b844919ee107932383e5b5712180809d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              16KB

                              MD5

                              8dedd8d0f9d8dd12869ce596649e38ac

                              SHA1

                              ff69d0eba57f67bae43492cdcc2946b2bfed3e83

                              SHA256

                              7d5d6c700ae4a810fe54db3e51bdb01f13bdf05b09f760b890f2f8b7a002d45e

                              SHA512

                              0b2422cfafb34cf9d0b9d78d8311ba4baa01c6379620d3e6ad5be3abde79dc84425ced96689b800997a3b1a458caf58f6e22ef0ca406c9b194e46cd43ea6f4d0

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              256KB

                              MD5

                              c4f9419626a1279cdf1e90e328e402c7

                              SHA1

                              24bf6a287b906a140b4f487eaa1387abe2e76094

                              SHA256

                              dded86e6de472f977d56aa1d38fdfd9fd923d01d0aa75d5f43b3ed247a68adf3

                              SHA512

                              d828c71a00b99609d09dca37d72135de8f9c61b36d3e99f3ec194d38b9309841c10cb8a04186451614196896041cd11c3a1161eff6e8f11edd79e43ead8e3a10

                            • C:\Users\Admin\AppData\Local\Temp\_MEI36042\VCRUNTIME140.dll

                              Filesize

                              95KB

                              MD5

                              f34eb034aa4a9735218686590cba2e8b

                              SHA1

                              2bc20acdcb201676b77a66fa7ec6b53fa2644713

                              SHA256

                              9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

                              SHA512

                              d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

                            • C:\Users\Admin\AppData\Local\Temp\_MEI36042\_ctypes.pyd

                              Filesize

                              55KB

                              MD5

                              557e07c6acc0c72cca1e08b4237d6c6e

                              SHA1

                              9b738020a7f819cf183aa7f71e682fadf2223d26

                              SHA256

                              eba90ad9b99d6f26ef46f38783afc048e46462a8069209af049746824819c9ff

                              SHA512

                              8983b7f41932a29bc514966d7a660dd69a8ff0209ce18a6dc060aaba4a1f73fa1069a628382b8419c12d9c19b7437eba41aa6eb017f1a7f46f18ab0a0857ae63

                            • C:\Users\Admin\AppData\Local\Temp\_MEI36042\base_library.zip

                              Filesize

                              859KB

                              MD5

                              7189563ca7d7bc1d2973a0a9452eb127

                              SHA1

                              5652d5e4fa3b3bf55c6b1c79efab9c4f078f5415

                              SHA256

                              6f50b4dc2129ff8e22807dcce0bd93f74f803d7893abf8fd55a7ae7dfc5de06c

                              SHA512

                              6baa17b84707472ad4ab9548438c062099fe9160aec9b6a449af79618143f0342640ff135cd28ceb3b036e90cfa173bcfa2952ac9481a411880539b73a885946

                            • C:\Users\Admin\AppData\Local\Temp\_MEI36042\libffi-7.dll

                              Filesize

                              23KB

                              MD5

                              da6331f94e77d27b8124799ad92e0747

                              SHA1

                              55b360676c6702faf49cf4abfc33b34ffa2f4617

                              SHA256

                              3908a220d72d4252ad949d55d4d76921eeca4ab2a0dca5191b761604e06ae136

                              SHA512

                              faf3ec3d28d90ca408b8f07563169ebc201d9fb7b3ea16db9da7e28979bf787537ad2004fbde9443a69e8e1a6f621c52ff6b3d300897fb9e8b33763e0e63f80c

                            • C:\Users\Admin\AppData\Local\Temp\_MEI36042\python310.dll

                              Filesize

                              1.4MB

                              MD5

                              ec86db9f4137bb9133e198753f4a96d2

                              SHA1

                              f16993170355bc91b0405edaf034022eeb56473b

                              SHA256

                              3b763d1d40087c7f9186f9cf045edafdadac97dcf14ed808713b0534d2deea38

                              SHA512

                              870e0bb16b3b8664ad9bc4bc8b56db8a20ffa80d671c248b97d2f051a81397ee429ac0cf9c05031fc9896d17ece0145a232690b21eb4c92be9f010ddaee5f0c7

                            • C:\Users\Admin\AppData\Local\Temp\_MEI36042\ucrtbase.dll

                              Filesize

                              987KB

                              MD5

                              e6a8ac9fde345114f4b4ba6f5a6a3446

                              SHA1

                              56e755e74b29c98008871905b0c0f9d8189cf9f8

                              SHA256

                              c37346a77e309315b41f8e1e6825b605594b1e4bd50e97122cd31022dbc39ef8

                              SHA512

                              d9618cf52bcb39bcde3881afd3b7dc4f4b202a2b7138c968c63f4566f49f342dd99216ae8c085f8c4d026ff9a20c07f29eaf8d6b660a929619a6d60be4d07288

                            • memory/1384-69-0x00007FFB5E6D0000-0x00007FFB5E6F4000-memory.dmp

                              Filesize

                              144KB

                            • memory/1384-70-0x00007FFB60970000-0x00007FFB6097F000-memory.dmp

                              Filesize

                              60KB

                            • memory/1384-66-0x00007FFB4B4B0000-0x00007FFB4B915000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/1384-63-0x00007FFB5E6D0000-0x00007FFB5E6F4000-memory.dmp

                              Filesize

                              144KB

                            • memory/1384-65-0x00007FFB60970000-0x00007FFB6097F000-memory.dmp

                              Filesize

                              60KB

                            • memory/1384-58-0x00007FFB4B4B0000-0x00007FFB4B915000-memory.dmp

                              Filesize

                              4.4MB