Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:18
General
-
Target
cheatloader.exe
-
Size
1.2MB
-
MD5
79b6f064d75374a6a684d02be8bfda80
-
SHA1
8e0f8f9f70544bb5b7a5b46e4fd482f0039195b7
-
SHA256
3a000cdd0e7bbcb249b41e39e0f698c2eb416789303e671469abb45026936ac2
-
SHA512
9a73fd47aa47c762b253fbf1046ee09599ac1b8823cadf228816c1f7b283b5127c2f2f809eafcdf045535042c3661e28feb9db54a55e6afdd544e62facd4c9ab
-
SSDEEP
24576:dRgREUU9cEieHXV7yN0buhgYsbOlN9U3jaPsM:LyEy0b2lNy3jKsM
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
Processes:
resource yara_rule behavioral1/memory/864-7-0x0000000000F40000-0x0000000001070000-memory.dmp family_lumma_v4 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
cheatloader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cheatloader.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
cheatloader.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools cheatloader.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cheatloader.exepid process 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe 864 cheatloader.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cheatloader.exepid process 864 cheatloader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cheatloader.exepid process 864 cheatloader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cheatloader.exe"C:\Users\Admin\AppData\Local\Temp\cheatloader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VMWare Tools registry key
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:864