Overview
overview
6Static
static
303-08-2024...pi.zip
windows7-x64
103-08-2024...pi.zip
windows10-2004-x64
1CS2ESP77CH...UN.url
windows7-x64
6CS2ESP77CH...UN.url
windows10-2004-x64
3CS2ESP77CH...go.exe
windows7-x64
1CS2ESP77CH...go.exe
windows10-2004-x64
1CS2ESP77CH...s.json
windows7-x64
3CS2ESP77CH...s.json
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
03-08-2024_znSOIqCUSuM9Fpi.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
03-08-2024_znSOIqCUSuM9Fpi.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CS2ESP77CHEATER.FUN/CHEATER.FUN.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
CS2ESP77CHEATER.FUN/CHEATER.FUN.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CS2ESP77CHEATER.FUN/cs2go.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
CS2ESP77CHEATER.FUN/cs2go.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
CS2ESP77CHEATER.FUN/offsets.json
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
CS2ESP77CHEATER.FUN/offsets.json
Resource
win10v2004-20240802-en
General
-
Target
CS2ESP77CHEATER.FUN/offsets.json
-
Size
346B
-
MD5
dec659b2008345fd3ffafd0f0924ebc0
-
SHA1
925e4d8a3dbce5a8e45ad975327928d7e9bd856e
-
SHA256
f519366dbdd276b024666d2b1d79d4000d9e63727c51fc134732d6b17432ab32
-
SHA512
01d4f004c2028ec95ede925ce60d8b210b49b406ddd0185a011feeb3198bfa447454013f122005794642e6abd89620617605e9a2ca3b2ddc2a0f4a1bf8aade44
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1044 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1044 AcroRd32.exe 1044 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2764 1656 cmd.exe 31 PID 1656 wrote to memory of 2764 1656 cmd.exe 31 PID 1656 wrote to memory of 2764 1656 cmd.exe 31 PID 2764 wrote to memory of 1044 2764 rundll32.exe 32 PID 2764 wrote to memory of 1044 2764 rundll32.exe 32 PID 2764 wrote to memory of 1044 2764 rundll32.exe 32 PID 2764 wrote to memory of 1044 2764 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CS2ESP77CHEATER.FUN\offsets.json1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CS2ESP77CHEATER.FUN\offsets.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CS2ESP77CHEATER.FUN\offsets.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a27b0404eac6b45bc5a510e1f16e6cd9
SHA1822e70cda5328f674fee7bf9c74b446a270b372a
SHA256958785bbb1c33160664cd14cf39ebc94e9651e2324b26d399ebbc5a3ec248081
SHA51252f800f3825137307c4a9d7e4421a9009e993e5bd65ccdfbac973b89fd26bb663f4be7bcd03aff5d0d228c77398f265db3e00d129cb88b04cc27fa5c777b7ade