Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17/10/2024, 20:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/1f73t1afwcs7s2v/cheat.rar/file
Resource
win10-20240404-en
General
-
Target
https://www.mediafire.com/file/1f73t1afwcs7s2v/cheat.rar/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133736731306344395" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 824 chrome.exe 824 chrome.exe 3280 chrome.exe 3280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 824 chrome.exe 824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe Token: SeShutdownPrivilege 824 chrome.exe Token: SeCreatePagefilePrivilege 824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe 824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 824 wrote to memory of 4384 824 chrome.exe 73 PID 824 wrote to memory of 4384 824 chrome.exe 73 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 1140 824 chrome.exe 75 PID 824 wrote to memory of 2168 824 chrome.exe 76 PID 824 wrote to memory of 2168 824 chrome.exe 76 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77 PID 824 wrote to memory of 5112 824 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/1f73t1afwcs7s2v/cheat.rar/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffca65a9758,0x7ffca65a9768,0x7ffca65a97782⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:22⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3716 --field-trial-handle=1740,i,3791546696633077690,5725951065759759841,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD578c1d3c6c3323b3a8ffe0a0cbea1f1c5
SHA1078915f4a76431ab5532426063e483bd9cd92431
SHA256dad3140efba09d2802e3fbbe3a1426ff00be455cbf784f52c3b84f35fcf6fac0
SHA51288a4db05b0efb9e5dcff1301920b0ebd739a9f7ffc1c0f6e5f9aa16a817b6d80f3958009550d09965e9f72aeed4824f258ef740e88f74a6180643d8f523bc4d6
-
Filesize
5KB
MD56e56fc5b7e228df6da07e4e5ae951c8a
SHA1e068ccef328943480b8d5f0b173dfdfafa36f423
SHA2568525395c628c7bfa8a641746025e53f42d6f9ea71600bcc58245ecd42adda6c1
SHA512e2ea839b597d5788b9fc405491dae564592c6f7f8fa37a0d4df49b3a43f14a9bf96a4bd68a124419bebbad92287f49e525511228633c3251c5c42127d95885f7
-
Filesize
871B
MD5748b84945f2ebe5a217edbfeeedeba71
SHA191416d1386a58f600a8959943b490774832d4462
SHA2565d3450bd7204113f2550229a5c8128905146c61092c74ca565c79b0938c658e2
SHA512e70e25b703dedcf2a40731ee953db4b5bbdd375c600df79c6227843d5b09392f58b654d98e0e1fcedb3cd103f40b68874fde63bbceafd09a0229c1ef044e3607
-
Filesize
6KB
MD598c756f2662d74b00084546c5b46a1bc
SHA1cbe30cb73459c4c35ff0b6000bc9b2b1a48793fa
SHA2567ae39a2dc4dc7fdc47262f4992630f7b34e0d70a8d4442310860938b60a4b01b
SHA51261248f607d8ec295c9f72632d93becd5e4f70b523eb9d193c17a898d993fa7a668f2673685da4515e23d279d7cf02119323a0432eed4e32ba091c27ba447be0f
-
Filesize
6KB
MD539fb65eba8a7f6910d0e4b94b94bd9c5
SHA131d28085c5da025f8f6ac6542b141a0bf30b07fc
SHA2564317e4bcde347651376591c79e8f3fd13d84103280562b0dc83da833e657eca8
SHA51237cf018cea14b0cdb3548f82b55b693d5fed5237ccb365321e3c7f10535201533766189445983d80eec262ba60e6c7e8703ec2eccc40e01b7148270844efa8ad
-
Filesize
6KB
MD51c270d0d19de0463b60459ec0e63d7d7
SHA1cf7e1d5bd92414ed1905498c17c95c139897f5a2
SHA2562c3a8dcfdad6f85b12ec0042be26c40bd6a8afb35f1c0fb382ce99ce44f54df8
SHA512eee0f68f57647004ec0e7c89614b85b7c308954a6e118305f45b713b7527a751b747ed00fe053025e51ac46c588c10a8a198c507462b7daf74cdd4afa2276231
-
Filesize
136KB
MD5ea636e84224556b5c5bf8388d82e020f
SHA1701e97c8ca740d80f050fcf8e9d504a58127060b
SHA2566f5ab60afc3aaff21b7bef0242f66088598ff578f50108f9b839a1c2397a3eb8
SHA5129a14c70544ba2b8e2d4ab1e372672ac1a7c7feff3545f107de09798756693b33161053ee55dbbbd9f58f9a8ab6d3b82014e41d11f13776b0c8648cb3c49d6470
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd