Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 17:34
Behavioral task
behavioral1
Sample
release/main/cheat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
release/main/loader.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
release/map/Map.exe
Resource
win10v2004-20240709-en
General
-
Target
release/main/cheat.exe
-
Size
4.2MB
-
MD5
a30028b0ea588ce319b5a43b36770e78
-
SHA1
e712ff80e4ee0dfe8ee81b99ef690689a8991181
-
SHA256
28ad19883cb42f08fd9489cdc967ba1dc4e4720e97b1402b08d0f9506656454c
-
SHA512
7c7f83a545d99cd656a0548879233c5a464e5b057c82dbad10d08ca816fdf7ece98d416d5dabdae4c6868f3712438fe0c4bc326f64578cd3aa1652487af2c8de
-
SSDEEP
98304:ut4ovXJgFqXexki8wywAFX31GLSdfajrrAzuoVMn:U40+8XTdwg31+SAjroWn
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cheat.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" cheat.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cheat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cheat.exe -
resource yara_rule behavioral1/memory/4840-0-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-3-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-2-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-4-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-6-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-5-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-7-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-8-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-15-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida behavioral1/memory/4840-16-0x00007FF648F70000-0x00007FF649A35000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cheat.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4840 cheat.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4840 cheat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 4840 cheat.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3852 4840 cheat.exe 85 PID 4840 wrote to memory of 3852 4840 cheat.exe 85 PID 3852 wrote to memory of 3944 3852 cmd.exe 87 PID 3852 wrote to memory of 3944 3852 cmd.exe 87 PID 3852 wrote to memory of 4520 3852 cmd.exe 88 PID 3852 wrote to memory of 4520 3852 cmd.exe 88 PID 3852 wrote to memory of 4240 3852 cmd.exe 89 PID 3852 wrote to memory of 4240 3852 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\release\main\cheat.exe"C:\Users\Admin\AppData\Local\Temp\release\main\cheat.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release\main\cheat.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release\main\cheat.exe" MD53⤵PID:3944
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4520
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4240
-
-