Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01/06/2024, 01:17
Behavioral task
behavioral1
Sample
unpacked_cheat.exe
Resource
win10-20240404-en
4 signatures
150 seconds
General
-
Target
unpacked_cheat.exe
-
Size
10.3MB
-
MD5
5e4ad8f148ecf1b907ab280f457b5120
-
SHA1
79263a2e94ee1f1d630173f19e08962044f16fed
-
SHA256
9c76fe6533fed524ff7c846b38d6312d8545201a02a223aef92ee2c89210ffeb
-
SHA512
5120bf1280411b9813d9a9c9ec5ddfa8d61411199718ad427c86e84731d1abb8f8308f83ad9c1ed7c8392a31add5261a0b9cc956a81c8ad33e75dfcb1d880cdf
-
SSDEEP
196608:SchNrPMkkHYeJMbbcdhKQW84O4eV5FZjOCEIu5:SoNz9k4e/M5O4IjjpA5
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" unpacked_cheat.exe -
resource yara_rule behavioral1/memory/4448-1-0x00007FF769070000-0x00007FF769ABD000-memory.dmp themida behavioral1/memory/4448-9-0x00007FF769070000-0x00007FF769ABD000-memory.dmp themida -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4448 unpacked_cheat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 4448 unpacked_cheat.exe