Resubmissions

14/10/2024, 08:01

241014-jw3ndssckf 8

14/03/2024, 00:52

240314-a8eyesgh33 10

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 08:01

General

  • Target

    cheatchecker.exe

  • Size

    7.8MB

  • MD5

    64925f73451b96d282f4a3a6bd8d265a

  • SHA1

    3ec096d5f78b5d62b6d02b41697ff36ad1076cce

  • SHA256

    2575b49e96cf0027ea9469a23aa8ab722365f5fd614fa88c3d3ec2766a789f38

  • SHA512

    4de9dbe9f3dc7fbac5c3af20c2caae571a73cdf5026d7e1eb1b1bb5ce97db8f1df033be07966351fdfdd4e16265970dfa85cda54a05a046066f3ded177fbe16c

  • SSDEEP

    196608:7DA39sA6Lvn3QtRuQJShuxpVPoOGs2UqT9ZbWr39GSPV9p9N:PANsAG3QtRuf09oK2VVrMp

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cheatchecker.exe
    "C:\Users\Admin\AppData\Local\Temp\cheatchecker.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\cheatchecker.exe'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabAEE7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAF09.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1736-1-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1736-6-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1736-5-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1736-3-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1736-8-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1736-11-0x00000000011B0000-0x0000000001DF3000-memory.dmp

    Filesize

    12.3MB

  • memory/1736-12-0x00000000011B0000-0x0000000001DF3000-memory.dmp

    Filesize

    12.3MB

  • memory/1736-13-0x00000000011B0000-0x0000000001DF3000-memory.dmp

    Filesize

    12.3MB

  • memory/1736-0-0x00000000011B7000-0x0000000001619000-memory.dmp

    Filesize

    4.4MB

  • memory/1736-184-0x00000000011B0000-0x0000000001DF3000-memory.dmp

    Filesize

    12.3MB

  • memory/1736-183-0x00000000011B7000-0x0000000001619000-memory.dmp

    Filesize

    4.4MB

  • memory/1736-83-0x00000000011B7000-0x0000000001619000-memory.dmp

    Filesize

    4.4MB

  • memory/1736-10-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2488-16-0x00000000730B1000-0x00000000730B2000-memory.dmp

    Filesize

    4KB

  • memory/2488-21-0x00000000730B0000-0x000000007365B000-memory.dmp

    Filesize

    5.7MB

  • memory/2488-20-0x00000000730B0000-0x000000007365B000-memory.dmp

    Filesize

    5.7MB

  • memory/2488-19-0x00000000730B0000-0x000000007365B000-memory.dmp

    Filesize

    5.7MB

  • memory/2488-18-0x00000000730B0000-0x000000007365B000-memory.dmp

    Filesize

    5.7MB

  • memory/2488-17-0x00000000730B0000-0x000000007365B000-memory.dmp

    Filesize

    5.7MB