Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 23:33

General

  • Target

    Steam cheat engine/Files cheat/Steam CE.exe

  • Size

    16.1MB

  • MD5

    4646ce6163658aa1c8500d517775859e

  • SHA1

    2d3498cbf0a8ce5992909f87c86320f9278546f5

  • SHA256

    94435a79f66c55efaf942263a0318d11fd4c689b7a4f52386712f2a328677b76

  • SHA512

    740110a93e1c7e303f82a437ce44dd69ba4610facd208e8ec1387fdee88310265faf56815dcd8deabebcecaf8a8b951b9f9ef1ca02c8a6a972858c3039a9cfe1

  • SSDEEP

    393216:C3Z8A06vEQ3ITvzx46SxiILGREuV3WjI8O:C3ZIzx46YNL6WEZ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 43 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Steam cheat engine\Files cheat\Steam CE.exe
    "C:\Users\Admin\AppData\Local\Temp\Steam cheat engine\Files cheat\Steam CE.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/544-5-0x000000000F720000-0x000000000F721000-memory.dmp

    Filesize

    4KB

  • memory/544-3-0x000000000F710000-0x000000000F711000-memory.dmp

    Filesize

    4KB

  • memory/544-1-0x000000000F700000-0x000000000F701000-memory.dmp

    Filesize

    4KB

  • memory/544-0-0x000000000F700000-0x000000000F701000-memory.dmp

    Filesize

    4KB

  • memory/544-19-0x0000000006ED0000-0x0000000006ED1000-memory.dmp

    Filesize

    4KB

  • memory/544-17-0x0000000006ED0000-0x0000000006ED1000-memory.dmp

    Filesize

    4KB

  • memory/544-15-0x0000000006ED0000-0x0000000006ED1000-memory.dmp

    Filesize

    4KB

  • memory/544-13-0x0000000006EC0000-0x0000000006EC1000-memory.dmp

    Filesize

    4KB

  • memory/544-9-0x0000000006EC0000-0x0000000006EC1000-memory.dmp

    Filesize

    4KB

  • memory/544-7-0x0000000006EB0000-0x0000000006EB1000-memory.dmp

    Filesize

    4KB