Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 13:44
Behavioral task
behavioral1
Sample
Cheat.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Cheat.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Cheat.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Cheat.exe
Resource
win11-20240802-en
General
-
Target
Cheat.exe
-
Size
303KB
-
MD5
74d3f720e38b834198fee67e020bb736
-
SHA1
5fab6ccb0748a2de502b877c34d2409b1118bd30
-
SHA256
bc3a66a87018863d22a6a7a9afd15f0af5499d021f0ede01466011e0a64a0ce1
-
SHA512
f4ae410699ba0a4cc21fa946e51f5364ab13ac176627509a346bcb7924ae76b23149ba78f643211d64bc59d7eef81d304b477b3310d09eb797c07afdddee0277
-
SSDEEP
6144:b1E0T6MDdbICydeB1MnyCvG/9GzC6jmA1D0Lyf:b1z6yCvGFG+Y1D1f
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1254423260591030333/Im8Y-IPgPJTWTloM0jy_llzrxAFZLtGLTGrSJEpTfiSbOm4QV3WSBgCXN7xBYLC5ajH9
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1960 Cheat.exe 1960 Cheat.exe 1960 Cheat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1960 Cheat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2988 1960 Cheat.exe 30 PID 1960 wrote to memory of 2988 1960 Cheat.exe 30 PID 1960 wrote to memory of 2988 1960 Cheat.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cheat.exe"C:\Users\Admin\AppData\Local\Temp\Cheat.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1960 -s 11922⤵PID:2988
-