Overview
overview
7Static
static
3wind64_Byp...er.dll
windows7-x64
1wind64_Byp...er.dll
windows10-2004-x64
1wind64_Byp...ne.exe
windows7-x64
5wind64_Byp...ne.exe
windows10-2004-x64
7wind64_Byp...ne.chm
windows7-x64
1wind64_Byp...ne.chm
windows10-2004-x64
1wind64_Byp...64.sys
windows7-x64
1wind64_Byp...64.sys
windows10-2004-x64
1wind64_Byp...32.exe
windows7-x64
3wind64_Byp...32.exe
windows10-2004-x64
3wind64_Byp...64.exe
windows7-x64
1wind64_Byp...64.exe
windows10-2004-x64
1wind64_Byp...ver.js
windows7-x64
3wind64_Byp...ver.js
windows10-2004-x64
3wind64_Byp...ver.js
windows7-x64
3wind64_Byp...ver.js
windows10-2004-x64
3wind64_Byp...ver.js
windows7-x64
3wind64_Byp...ver.js
windows10-2004-x64
3wind64_Byp...nfo.js
windows7-x64
3wind64_Byp...nfo.js
windows10-2004-x64
3wind64_Byp...rch.js
windows7-x64
3wind64_Byp...rch.js
windows10-2004-x64
3wind64_Byp...can.js
windows7-x64
3wind64_Byp...can.js
windows10-2004-x64
3wind64_Byp...ipt.js
windows7-x64
3wind64_Byp...ipt.js
windows10-2004-x64
3wind64_Byp...can.js
windows7-x64
3wind64_Byp...can.js
windows10-2004-x64
3wind64_Byp...ode.js
windows7-x64
3wind64_Byp...ode.js
windows10-2004-x64
3wind64_Byp...ram.js
windows7-x64
3wind64_Byp...ram.js
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
wind64_Bypass-main/Cheat Engine 7.4/CSCompiler.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wind64_Bypass-main/Cheat Engine 7.4/CSCompiler.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
wind64_Bypass-main/Cheat Engine 7.4/Cheat Engine.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
wind64_Bypass-main/Cheat Engine 7.4/Cheat Engine.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
wind64_Bypass-main/Cheat Engine 7.4/CheatEngine.chm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
wind64_Bypass-main/Cheat Engine 7.4/CheatEngine.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
wind64_Bypass-main/Cheat Engine 7.4/DBK64.sys
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
wind64_Bypass-main/Cheat Engine 7.4/DBK64.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
wind64_Bypass-main/Cheat Engine 7.4/DotNetDataCollector32.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
wind64_Bypass-main/Cheat Engine 7.4/DotNetDataCollector32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
wind64_Bypass-main/Cheat Engine 7.4/DotNetDataCollector64.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
wind64_Bypass-main/Cheat Engine 7.4/DotNetDataCollector64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaEventServer.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaEventServer.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaServer.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaServer.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dlls/src/Mono/MonoDataCollector/PipeServer.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dlls/src/Mono/MonoDataCollector/PipeServer.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dotnetinfo.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dotnetinfo.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dotnetsearch.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/dotnetsearch.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/modulelistscan.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/modulelistscan.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/monoscript.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/monoscript.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/patchscan.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/patchscan.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/pseudocode.js
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/pseudocode.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/pseudocodediagram.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
wind64_Bypass-main/Cheat Engine 7.4/autorun/pseudocodediagram.js
Resource
win10v2004-20240802-en
General
-
Target
wind64_Bypass-main/Cheat Engine 7.4/DotNetDataCollector32.exe
-
Size
174KB
-
MD5
2d493ab1a8391f52e747987aad17d4b3
-
SHA1
241045db02ac5c469039c32daa4ce8bd8cb8a012
-
SHA256
976c972f163aa3743d27ac7f554914154caa554b95c762150c8c13abe1344708
-
SHA512
a23a8fbf865da1f56e442e0775f62c169b6f1b0d1f1610fff0db04dd7344c2f93f47d0ab0e85ec8ef6da9e62a95e10cfac5d87f27edc2e9a2215e3ae509f0442
-
SSDEEP
3072:9VM4Jg4Ffk8BBtaJMumFAnN4Gmy2rv1BMqIMqsGLOwy860jYAf3gemwOITuOR:jM4r59uJmHy81gMZGtfwemqTl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DotNetDataCollector32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 208 DotNetDataCollector32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wind64_Bypass-main\Cheat Engine 7.4\DotNetDataCollector32.exe"C:\Users\Admin\AppData\Local\Temp\wind64_Bypass-main\Cheat Engine 7.4\DotNetDataCollector32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:208