Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 21:39
Behavioral task
behavioral1
Sample
release8-2-24/release/main/cheat.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
release8-2-24/release/main/cheat.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
release8-2-24/release/main/loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
release8-2-24/release/main/loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
release8-2-24/release/map/Map.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
release8-2-24/release/map/Map.exe
Resource
win10v2004-20240802-en
General
-
Target
release8-2-24/release/main/cheat.exe
-
Size
4.1MB
-
MD5
6b3a57759fbc362815348b8ce1475519
-
SHA1
c340a5ae66aeb79a9dd4f8b69a5161fe4d9fa0fd
-
SHA256
c218e0e1188dd4b7504a38031af9eeb268ad39d9fa64abd7b0813379a44e8cce
-
SHA512
465416ae68f3b7616d917ee05bc5098aeb8ded7477cc74a46a7c5a74941dce29a4ebdb4dfc016bfaed736a8066923d9c51e5c8bf515d6b1017622f656dbe49f0
-
SSDEEP
98304:VC96wN+PReiGh9iHzYLKy8D1oota/wfSvEYMnRVSAMJwYNIdT:OaGh9iHzYZ8D1vtMwfSvJAINIdT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cheat.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" cheat.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cheat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cheat.exe -
resource yara_rule behavioral2/memory/3944-0-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-2-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-3-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-4-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-5-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-6-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-7-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-8-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-21-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida behavioral2/memory/3944-22-0x00007FF68AFB0000-0x00007FF68BA5C000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cheat.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3944 cheat.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3944 cheat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3944 cheat.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3944 wrote to memory of 4188 3944 cheat.exe 84 PID 3944 wrote to memory of 4188 3944 cheat.exe 84 PID 4188 wrote to memory of 2204 4188 cmd.exe 86 PID 4188 wrote to memory of 2204 4188 cmd.exe 86 PID 4188 wrote to memory of 2056 4188 cmd.exe 87 PID 4188 wrote to memory of 2056 4188 cmd.exe 87 PID 4188 wrote to memory of 2908 4188 cmd.exe 88 PID 4188 wrote to memory of 2908 4188 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\release8-2-24\release\main\cheat.exe"C:\Users\Admin\AppData\Local\Temp\release8-2-24\release\main\cheat.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release8-2-24\release\main\cheat.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release8-2-24\release\main\cheat.exe" MD53⤵PID:2204
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2056
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2908
-
-