Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 23:33

General

  • Target

    Steam cheat engine/Files cheat/Steam CE.exe

  • Size

    16.1MB

  • MD5

    4646ce6163658aa1c8500d517775859e

  • SHA1

    2d3498cbf0a8ce5992909f87c86320f9278546f5

  • SHA256

    94435a79f66c55efaf942263a0318d11fd4c689b7a4f52386712f2a328677b76

  • SHA512

    740110a93e1c7e303f82a437ce44dd69ba4610facd208e8ec1387fdee88310265faf56815dcd8deabebcecaf8a8b951b9f9ef1ca02c8a6a972858c3039a9cfe1

  • SSDEEP

    393216:C3Z8A06vEQ3ITvzx46SxiILGREuV3WjI8O:C3ZIzx46YNL6WEZ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 52 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Steam cheat engine\Files cheat\Steam CE.exe
    "C:\Users\Admin\AppData\Local\Temp\Steam cheat engine\Files cheat\Steam CE.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2176-3-0x0000000007FB0000-0x0000000007FB1000-memory.dmp

    Filesize

    4KB

  • memory/2176-0-0x0000000007FB0000-0x0000000007FB1000-memory.dmp

    Filesize

    4KB

  • memory/2176-7-0x0000000007FC0000-0x0000000007FC1000-memory.dmp

    Filesize

    4KB

  • memory/2176-11-0x0000000007FD0000-0x0000000007FD1000-memory.dmp

    Filesize

    4KB

  • memory/2176-15-0x0000000007FF0000-0x0000000007FF1000-memory.dmp

    Filesize

    4KB

  • memory/2176-39-0x0000000008010000-0x0000000008011000-memory.dmp

    Filesize

    4KB

  • memory/2176-35-0x0000000008010000-0x0000000008011000-memory.dmp

    Filesize

    4KB

  • memory/2176-31-0x0000000008010000-0x0000000008011000-memory.dmp

    Filesize

    4KB

  • memory/2176-27-0x0000000008000000-0x0000000008001000-memory.dmp

    Filesize

    4KB

  • memory/2176-19-0x0000000008000000-0x0000000008001000-memory.dmp

    Filesize

    4KB

  • memory/2176-40-0x0000000008290000-0x0000000008291000-memory.dmp

    Filesize

    4KB

  • memory/2176-49-0x0000000008290000-0x0000000008291000-memory.dmp

    Filesize

    4KB