Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
3ch/Cheat Engine.exe
windows7-x64
5ch/Cheat Engine.exe
windows10-2004-x64
5ch/CheatEngine.chm
windows7-x64
1ch/CheatEngine.chm
windows10-2004-x64
1ch/DotNetD...32.exe
windows7-x64
1ch/DotNetD...32.exe
windows10-2004-x64
1ch/DotNetD...64.exe
windows7-x64
1ch/DotNetD...64.exe
windows10-2004-x64
1ch/libipt-32.dll
windows7-x64
1ch/libipt-32.dll
windows10-2004-x64
3ch/libipt-64.dll
windows7-x64
1ch/libipt-64.dll
windows10-2004-x64
1ch/libmikmod32.dll
windows7-x64
1ch/libmikmod32.dll
windows10-2004-x64
1ch/libmikmod64.dll
windows7-x64
1ch/libmikmod64.dll
windows10-2004-x64
1ch/lua53-32.dll
windows7-x64
3ch/lua53-32.dll
windows10-2004-x64
3ch/lua53-64.dll
windows7-x64
1ch/lua53-64.dll
windows10-2004-x64
1ch/luaclient-i386.dll
windows7-x64
3ch/luaclient-i386.dll
windows10-2004-x64
3ch/luaclie...64.dll
windows7-x64
1ch/luaclie...64.dll
windows10-2004-x64
1ch/plugins...ple.js
windows7-x64
3ch/plugins...ple.js
windows10-2004-x64
3ch/plugins...orm.js
windows7-x64
3ch/plugins...orm.js
windows10-2004-x64
3ch/plugins...rm.vbs
windows7-x64
1ch/plugins...rm.vbs
windows10-2004-x64
1ch/plugins...le.dll
windows7-x64
1ch/plugins...le.dll
windows10-2004-x64
1Analysis
-
max time kernel
298s -
max time network
260s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-es -
resource tags
arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
05/07/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
ch/Cheat Engine.exe
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
ch/Cheat Engine.exe
Resource
win10v2004-20240704-es
Behavioral task
behavioral3
Sample
ch/CheatEngine.chm
Resource
win7-20240508-es
Behavioral task
behavioral4
Sample
ch/CheatEngine.chm
Resource
win10v2004-20240704-es
Behavioral task
behavioral5
Sample
ch/DotNetDataCollector32.exe
Resource
win7-20240419-es
Behavioral task
behavioral6
Sample
ch/DotNetDataCollector32.exe
Resource
win10v2004-20240508-es
Behavioral task
behavioral7
Sample
ch/DotNetDataCollector64.exe
Resource
win7-20240704-es
Behavioral task
behavioral8
Sample
ch/DotNetDataCollector64.exe
Resource
win10v2004-20240704-es
Behavioral task
behavioral9
Sample
ch/libipt-32.dll
Resource
win7-20240508-es
Behavioral task
behavioral10
Sample
ch/libipt-32.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral11
Sample
ch/libipt-64.dll
Resource
win7-20240704-es
Behavioral task
behavioral12
Sample
ch/libipt-64.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral13
Sample
ch/libmikmod32.dll
Resource
win7-20240221-es
Behavioral task
behavioral14
Sample
ch/libmikmod32.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral15
Sample
ch/libmikmod64.dll
Resource
win7-20240508-es
Behavioral task
behavioral16
Sample
ch/libmikmod64.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral17
Sample
ch/lua53-32.dll
Resource
win7-20240508-es
Behavioral task
behavioral18
Sample
ch/lua53-32.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral19
Sample
ch/lua53-64.dll
Resource
win7-20240419-es
Behavioral task
behavioral20
Sample
ch/lua53-64.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral21
Sample
ch/luaclient-i386.dll
Resource
win7-20240704-es
Behavioral task
behavioral22
Sample
ch/luaclient-i386.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral23
Sample
ch/luaclient-x86_64.dll
Resource
win7-20240704-es
Behavioral task
behavioral24
Sample
ch/luaclient-x86_64.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral25
Sample
ch/plugins/c# template/CEPluginLibrary/PluginExample.js
Resource
win7-20240508-es
Behavioral task
behavioral26
Sample
ch/plugins/c# template/CEPluginLibrary/PluginExample.js
Resource
win10v2004-20240704-es
Behavioral task
behavioral27
Sample
ch/plugins/c# template/CEPluginLibrary/PluginExampleForm.js
Resource
win7-20240705-es
Behavioral task
behavioral28
Sample
ch/plugins/c# template/CEPluginLibrary/PluginExampleForm.js
Resource
win10v2004-20240704-es
Behavioral task
behavioral29
Sample
ch/plugins/c# template/CEPluginLibrary/PluginExampleForm.vbs
Resource
win7-20240221-es
Behavioral task
behavioral30
Sample
ch/plugins/c# template/CEPluginLibrary/PluginExampleForm.vbs
Resource
win10v2004-20240704-es
Behavioral task
behavioral31
Sample
ch/plugins/c# template/CEPluginLibrary/bin/Release/CEPluginExample.dll
Resource
win7-20240705-es
Behavioral task
behavioral32
Sample
ch/plugins/c# template/CEPluginLibrary/bin/Release/CEPluginExample.dll
Resource
win10v2004-20240704-es
General
-
Target
ch/Cheat Engine.exe
-
Size
375KB
-
MD5
2ce992abd25f22de9a9b737bc608cf89
-
SHA1
d42cbe3f341b617f2565bacb7c1b9f40c89580e4
-
SHA256
f194daf2370bf554d37377be46b93d5a6b3dfaef1326d24740aee0989745c881
-
SHA512
e4f1fceea371d683ecb31ffac61ffa7a75ca8b87f8032ab1fc2624250cc8eef851cccfa12d117c0d104f8056a01ffb4260ac58774faaaef71ced5ecb66ae1ec2
-
SSDEEP
6144:/e0N02QaC/5SkHic3ivvM87DeiyF7tWwQE8MktvyFgkiMggugEkkoSE5hsB:G0N02Qh/QkLyvxty+PwkVyFgkidgugEX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation Cheat Engine.exe -
Drops file in System32 directory 43 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM32\profapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\MSCTF.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\sechost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shlwapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\imm32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\psapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\combase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ole32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ws2_32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\bcryptPrimitives.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\shfolder.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\RPCRT4.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shell32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\comdlg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wininet.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\windows.storage.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\Wldp.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\apphelp.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\oleaut32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcp_win.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\clbcatq.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\win32u.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\version.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\opengl32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\uxtheme.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\KERNEL32.DLL cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ucrtbase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\GDI32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\advapi32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\explorerframe.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\KERNELBASE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\user32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\gdi32full.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcrt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\imagehlp.dll cheatengine-x86_64-SSE4-AVX2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\comctl32.dll cheatengine-x86_64-SSE4-AVX2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 9 Cheat Engine 7.2 : luascript-ceshare -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLoadDriverPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreateGlobalPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLockMemoryPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeSecurityPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTakeOwnershipPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeManageVolumePrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeBackupPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreatePagefilePrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeShutdownPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeRestorePrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 3384 cheatengine-x86_64-SSE4-AVX2.exe Token: SeIncBasePriorityPrivilege 3384 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3384 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3384 2188 Cheat Engine.exe 90 PID 2188 wrote to memory of 3384 2188 Cheat Engine.exe 90 PID 3384 wrote to memory of 216 3384 cheatengine-x86_64-SSE4-AVX2.exe 92 PID 3384 wrote to memory of 216 3384 cheatengine-x86_64-SSE4-AVX2.exe 92 PID 3384 wrote to memory of 216 3384 cheatengine-x86_64-SSE4-AVX2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ch\Cheat Engine.exe"C:\Users\Admin\AppData\Local\Temp\ch\Cheat Engine.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\ch\cheatengine-x86_64-SSE4-AVX2.exe"C:\Users\Admin\AppData\Local\Temp\ch\cheatengine-x86_64-SSE4-AVX2.exe"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\ch\Tutorial-i386.exe"C:\Users\Admin\AppData\Local\Temp\ch\Tutorial-i386.exe"3⤵PID:216
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --field-trial-handle=4296,i,17743955589867904268,13122632177464372916,262144 --variations-seed-version --mojo-platform-channel-handle=2872 /prefetch:81⤵PID:4544