Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 20:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
CheatInjector.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
CheatInjector.exe
-
Size
330KB
-
MD5
60d75edd486ced6dc5e141150e237ae7
-
SHA1
59e85f89a059e97bb84d81616b7dd7cecc88001d
-
SHA256
50b63082315875ea18e044d14f315d1eccdf54002c9f2021a40b3eaeaedc323f
-
SHA512
c6ab625334ab4ec20a9ed0e3b6cf1cd4b1c09d9b30fc2694c13dcae2bf17b99fbbdeafcedc0feb4eca3e6ba99e75f198b1c7ce23dc03be352879fbc190081e19
-
SSDEEP
6144:76pCQYGy5n8funosMg5kFjfKC/6PRUt6Ct1f+8M3TKcHiE:76pCQ3yyfuosMg52fd/IRuM3TNl
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2076 set thread context of 2788 2076 CheatInjector.exe 31 -
Program crash 2 IoCs
pid pid_target Process procid_target 2176 2076 WerFault.exe 29 2648 2788 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatInjector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatInjector.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2788 2076 CheatInjector.exe 31 PID 2076 wrote to memory of 2176 2076 CheatInjector.exe 32 PID 2076 wrote to memory of 2176 2076 CheatInjector.exe 32 PID 2076 wrote to memory of 2176 2076 CheatInjector.exe 32 PID 2076 wrote to memory of 2176 2076 CheatInjector.exe 32 PID 2788 wrote to memory of 2648 2788 CheatInjector.exe 33 PID 2788 wrote to memory of 2648 2788 CheatInjector.exe 33 PID 2788 wrote to memory of 2648 2788 CheatInjector.exe 33 PID 2788 wrote to memory of 2648 2788 CheatInjector.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatInjector.exe"C:\Users\Admin\AppData\Local\Temp\CheatInjector.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\CheatInjector.exe"C:\Users\Admin\AppData\Local\Temp\CheatInjector.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 1483⤵
- Program crash
PID:2648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 682⤵
- Program crash
PID:2176
-