Analysis
-
max time kernel
71s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 20:55
Static task
static1
General
-
Target
Kgcheat.exe
-
Size
1.1MB
-
MD5
cfeee3c91e88223cdf73628e32aa0ac7
-
SHA1
9aed5554df0198884824667b24f88f65a114c49b
-
SHA256
d6677579355c01a07792d6ed3678b6e7711111e326f6147a3b447634b5cec5f4
-
SHA512
60be26bafec0aa86c1487fa26210ec2328f86634a5a7037be47090b68a016c50a57130ebdd9a05b1a32465b49be99cdc60cb375080d51bccc4f7478be875d22c
-
SSDEEP
24576:AuDXTIGaPhEYzUzA0YT9mf+g8Gd4HXdTbX5U2ZFskFzZ+0:vDjlabwz9YTkwGd43BX5U2Ykvx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Kgcheat.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Kgcheat.exe -
Executes dropped EXE 1 IoCs
Processes:
samp.exepid Process 4856 samp.exe -
Processes:
resource yara_rule behavioral1/files/0x000b000000023b58-6.dat upx behavioral1/memory/4856-10-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/4856-13-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/4856-18-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/4856-21-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/4856-22-0x0000000000400000-0x0000000000525000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
samp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language samp.exe -
Modifies registry class 2 IoCs
Processes:
samp.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ samp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ samp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
samp.exepid Process 4856 samp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Kgcheat.exedescription pid Process procid_target PID 1052 wrote to memory of 4856 1052 Kgcheat.exe 84 PID 1052 wrote to memory of 4856 1052 Kgcheat.exe 84 PID 1052 wrote to memory of 4856 1052 Kgcheat.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kgcheat.exe"C:\Users\Admin\AppData\Local\Temp\Kgcheat.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\samp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\samp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD5c1aedd9f2dac8a7f79ed40d264b4df6d
SHA16faebb34ab3dc53565a53affda48a7f7a2faf3ff
SHA256f7c4372c8545121938230ae0c9f1d9bd297836e8ad37afa710ee93f2c4791ade
SHA512d7ed34e9e97be609387b367463d559037f4c69ffa6d3a25943536d98f6a8f4cbe6353d838c47a9d7ee7d43c875d18a08ce19c36428cf37fc5b8a723ff34ecb36