Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/06/2024, 01:17

General

  • Target

    unpacked_cheat.exe

  • Size

    10.3MB

  • MD5

    5e4ad8f148ecf1b907ab280f457b5120

  • SHA1

    79263a2e94ee1f1d630173f19e08962044f16fed

  • SHA256

    9c76fe6533fed524ff7c846b38d6312d8545201a02a223aef92ee2c89210ffeb

  • SHA512

    5120bf1280411b9813d9a9c9ec5ddfa8d61411199718ad427c86e84731d1abb8f8308f83ad9c1ed7c8392a31add5261a0b9cc956a81c8ad33e75dfcb1d880cdf

  • SSDEEP

    196608:SchNrPMkkHYeJMbbcdhKQW84O4eV5FZjOCEIu5:SoNz9k4e/M5O4IjjpA5

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\unpacked_cheat.exe
    "C:\Users\Admin\AppData\Local\Temp\unpacked_cheat.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    PID:4448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4448-1-0x00007FF769070000-0x00007FF769ABD000-memory.dmp

    Filesize

    10.3MB

  • memory/4448-9-0x00007FF769070000-0x00007FF769ABD000-memory.dmp

    Filesize

    10.3MB