Analysis
-
max time kernel
37s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-de -
resource tags
arch:x64arch:x86image:win10v2004-20240426-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
11/06/2024, 10:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/WzrterFX/cs2-wware-external-esp?tab=readme-ov-file
Resource
win10v2004-20240426-de
General
-
Target
https://github.com/WzrterFX/cs2-wware-external-esp?tab=readme-ov-file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625741480510437" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 900 chrome.exe 900 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2496 OpenWith.exe 376 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 900 chrome.exe 900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe Token: SeShutdownPrivilege 900 chrome.exe Token: SeCreatePagefilePrivilege 900 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe 900 chrome.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 2496 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe 376 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 916 900 chrome.exe 80 PID 900 wrote to memory of 916 900 chrome.exe 80 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 644 900 chrome.exe 81 PID 900 wrote to memory of 2280 900 chrome.exe 82 PID 900 wrote to memory of 2280 900 chrome.exe 82 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83 PID 900 wrote to memory of 4276 900 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/WzrterFX/cs2-wware-external-esp?tab=readme-ov-file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1149ab58,0x7fff1149ab68,0x7fff1149ab782⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:22⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:12⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4352 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:82⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1912,i,2403494591611370681,6247696781397115348,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4304
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3252
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2496
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\cs2-wware-external-esp-master\README.md2⤵PID:1604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb8366ce36f1e48005204245037df783
SHA105ad66f8abd04404db615f17eb60e3e069bedb8f
SHA25670f221ddbd8637650c8787bfd4862cfeb7a9fb6d2a6ffada5597847bc3e7181c
SHA512cd8c9ae1d56cfa251a9a12cc8d8824466fdeb98eae7769f80a8840d19f0ef01decc583d673743cbfd0b91b4188210cf26e2064d6bff7baaff337e1e8365b29d3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD51c59cb1cf79f39d478acc60a5e1078b6
SHA1835db3ae80f3c77094947819f47feaf6bda174d0
SHA256c89f7e8dda301322964640f61a77158fa65d09b16d64a7c09f37631d6d3cb49c
SHA512446592471b53ed44cb5015a08577f296459d053a6639f25ade6b1dc42585739e34e50a26920a57e66e61960b9435b10085247f404a97841c1bf5fea85bcd2dd1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5750d9ab52ad2b07440e8d9b1f9a4bfcb
SHA1c244181f70068ec2d48d0798da49795c9d3c1369
SHA2560085230077e7d9bebd9935c1bb45dde165bb586667dbb50f35f49d6da5191afc
SHA51224493564bdabba85aa0f6cc385147eb629bbb2d59f3aa89835dcb434e183a033462b201c97d08a0bb05011cb81036466ae9d806263e1f796b2dbfb660684fef9
-
Filesize
7KB
MD567273cf2a539c9a890a3e8c506cf2fd5
SHA1955fb7a74dd9ff7b7001ee44e97ae9adf56f3986
SHA256daf18cb22a7cf6d8f4d80c2724042cdf61aaa228da23e8f824fd5fa1c7f18f02
SHA512896470c9fa96196486edf6343a92ce5d6c7b2d1e939c95c9e1ba9eaec48402c0ac0dbb7313bc3efc98c0acc6fe40ee52f73abee8684576fe65633fdda1049687
-
Filesize
7KB
MD59bb5a6718b91745dc000652fd501399e
SHA10a2ffba1313ec2418e6908bd2718e5f1c437d9eb
SHA256776f006200e8a93b21e685d1fcc9781f401dd0d41261b33330b05546a7b73401
SHA5122dcfafe4c13cf2c15732e548bdaf84f5c2ad758b8cb068015bc16f26eee5387d77bc51f25256af867ad37a0e46e1bf4ac0bb16c69751218264883798b8ed62da
-
Filesize
130KB
MD53be82428ab8e19e5fc7134009b63a95d
SHA1a9b8e15f58080041e4618ce5b716d07b9bf0223d
SHA256c3a57a781a832bef61d7f0d105497c489d2dc0d05557b4872bce1771c2edc6ca
SHA512ce9454be336872f7906eeb363221182180d95cd744da5504dde8e2434d2abe102f3b59cca03c944cc0c93031f99dff0c90e92a98da54c3da8a50a4f77ea61bc4
-
Filesize
130KB
MD5e11037e0d240e0c73329a6fd5da16b07
SHA12296c65d55d0999be280a05b0950cd00dd422726
SHA256aeba3716dd0efa9377e313a7bd5e418f94a94a54a8ba486dafb0345b05d804d8
SHA512dfef2b88fa38ed0594c4a4c12024208bb863868dd7d8f9d96427d064759f106a3c2f10815ff22d0d1d906f2445f70225ac5c6f38d1bb0595d6216558ebf65391
-
Filesize
878KB
MD5ca8020b74eb9dad6e988c781c9ea5d33
SHA17a3972e862c09421920bd7ff03c1662fd0c2b274
SHA2564366b133032ad645b6acb6c1ea2c81bb9bbf320a3ff40f36f3f6bcee8d15878c
SHA512a7b84224b85eaddcf0aece70bf86b3e2984ccdc7008bec8e630f4efd0d5cf0849d41d14a467a85f3030048f28c1f13fbf6bbe02bbf753f08723d51bcfafcdccb