Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-de -
resource tags
arch:x64arch:x86image:win10v2004-20240611-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
03/07/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
cs2-cheat-premium-cs2-hacks-undet.html
Resource
win10v2004-20240611-de
General
-
Target
cs2-cheat-premium-cs2-hacks-undet.html
-
Size
37KB
-
MD5
0603906504a6134619e4fe5ed7190bf8
-
SHA1
3a85e200046293310c284af88692b318cab0914b
-
SHA256
6e936ead7a0ea4be863a8ae938a8d05b25d5961063ffeb6063b675cac3f53213
-
SHA512
6304e0369dc75cd3b5aa052e586c2f83a4ce463879ae9deef403b9d9f5ae86fde47f873963bbd360c10de7ee8f1caeff2d6bdab12ccb6fb5d037ef1badb0fd48
-
SSDEEP
768:x+YyB+Yyvg7SUEjDYbWxbQZE7mbuSu4IHkfvTCf:x+YyB+YyMDAmaSu4IHk3uf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133645039650151192" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3480 2772 chrome.exe 84 PID 2772 wrote to memory of 3480 2772 chrome.exe 84 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 4572 2772 chrome.exe 85 PID 2772 wrote to memory of 3260 2772 chrome.exe 86 PID 2772 wrote to memory of 3260 2772 chrome.exe 86 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87 PID 2772 wrote to memory of 4644 2772 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\cs2-cheat-premium-cs2-hacks-undet.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde383ab58,0x7ffde383ab68,0x7ffde383ab782⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:22⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:12⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:12⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4344 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2616 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:82⤵
- Modifies registry class
PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 --field-trial-handle=1872,i,15433968391068258520,16057764857255782965,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD565f995ab3e4d64448c533281802cb1fe
SHA1da1cb9bc88bb8881c7e2d237301288af9cb3e356
SHA256eff1210f2ff42845fbe01ddf9d9fd5db9d92c975d7d2785936bd900872e01874
SHA5123a4a86a7efada65a81056ea36b8a406b116457abd393ff1a2d5c62aa4ff0dda7ba17d690778c7e9a94493840f820cbe1e1ccbfa80940952f81a355ca0a492436
-
Filesize
2KB
MD5ed6a3dc69ecb2535498589c8fd00e156
SHA1b481af8c1cfbcc898e521d8592936d212ba77dba
SHA2566ab1a2363fa670611ac22cad4dc3667a5f610778f7e539483f5c0c1c1f74b241
SHA51264cdbdfe525ae702d59e5d1b193a7b7683fab78aad74b6d9e54f600eb8f05aa4d08ce6d8452bfe8d5cc821207cf4a02577ad6408c9ff43ceb05386620f7a7e2e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD537ac1747a5bf51c7f18f44018616664a
SHA1e1a2f8871185c51b5c2a42094324bf6b69338292
SHA2564701944b8bbebf880e8d513591d1c13c39165385b31d6f1bcf33dd86b42fb63d
SHA51230f19a580e81350365cb87fc1931fec945791a5b6655f736752c8bb6fc99b369bb12453da8e12fa7ca0fed558edbc84191cbd93c8c486984f9183a7d6795c865
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a713399c-c973-4d21-8b49-816028c59b2e.tmp
Filesize6KB
MD5577cef1445de46e62c1fc70ae3426621
SHA1626fc981b244b969e3225de6b850c4b09e5e1e01
SHA2567c5a36ae301ac35434c5ee662e85dad1e4888cfc66f9cd7a770571698e821bbe
SHA512cf46ceeba9399f04c79ca0918f4faac32f019524ba1631f9d81c15fd15b9b6a87e14d4e49cad09f9a433149cb6be09827a93ab8bacc347cf42ff1a5f6b07fbe7
-
Filesize
138KB
MD5cfeb0a28341904c906fe9efcba84ce6d
SHA134b58bfc917333d437d0d973b5f6205594811b80
SHA256274ef36ba42d69df6da7a2023fbda55c2e19e18108e475c56fc5ec0fe46e677d
SHA51299f01d91126aa698816aceef436f1700c2a68e2f946f93e9f29e6fb09b3629344d834621f712e5748832b03748471dfb9a09dd5d796a937204b90a4c70040e28