File name:

CheatEngine.zip

Full analysis: https://app.any.run/tasks/3f2b5bcc-311c-4117-8832-2d6011e287c3
Verdict: Malicious activity
Analysis date: April 23, 2021, 16:45:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

BBF128FCB9ABE7595741214179BA672E

SHA1:

664CED6B12EAB81BFEBBDB6CBE75996184B7CB9B

SHA256:

FD6F7E8E7A351FE3E0FC0B2997B1AE3606FFEF62647C5E677DF4BDC9A9AC6334

SSDEEP:

393216:ckT2HEJmHYUrPmG2f45GacbEU8HfbSKh3B595v3sn/T9H1uKH70nB1kkQSZrXaGM:k/4yPZ2sjYz8Hfua39Bsnb9HEKbG7ks0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3204)
      • cheatengine-i386.exe (PID: 1232)
      • cheatengine-i386.exe (PID: 1660)
      • cheatengine-i386.exe (PID: 3628)
    • Application was dropped or rewritten from another process

      • Cheat Engine.exe (PID: 2708)
      • Cheat Engine.exe (PID: 2272)
      • cheatengine-i386.exe (PID: 1232)
      • Cheat Engine.exe (PID: 2900)
      • Cheat Engine.exe (PID: 984)
      • cheatengine-i386.exe (PID: 3628)
      • cheatengine-i386.exe (PID: 1052)
      • cheatengine-i386.exe (PID: 1660)
  • SUSPICIOUS

    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2552)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2552)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2552)
  • INFO

    • Manual execution by user

      • Cheat Engine.exe (PID: 2708)
      • Cheat Engine.exe (PID: 2272)
      • Cheat Engine.exe (PID: 2900)
      • Cheat Engine.exe (PID: 984)
      • NOTEPAD.EXE (PID: 2852)
      • cheatengine-i386.exe (PID: 1052)
      • cheatengine-i386.exe (PID: 1660)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2021:04:23 18:38:12
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: CheatEngine/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
11
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs cheat engine.exe no specs cheat engine.exe cheatengine-i386.exe cheat engine.exe no specs cheat engine.exe cheatengine-i386.exe cheatengine-i386.exe no specs cheatengine-i386.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
984"C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exe" C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
6.3.0.0
Modules
Images
c:\users\admin\desktop\cheatengine\cheat engine.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1052"C:\Users\admin\Desktop\CheatEngine\cheatengine-i386.exe" C:\Users\admin\Desktop\CheatEngine\cheatengine-i386.exeexplorer.exe
User:
admin
Company:
Cheat Engine
Integrity Level:
MEDIUM
Description:
Cheat Engine
Exit code:
3221226540
Version:
6.6.0.4880
Modules
Images
c:\users\admin\desktop\cheatengine\cheatengine-i386.exe
c:\systemroot\system32\ntdll.dll
1232"C:\Users\admin\Desktop\CheatEngine\cheatengine-i386.exe" C:\Users\admin\Desktop\CheatEngine\cheatengine-i386.exe
Cheat Engine.exe
User:
admin
Company:
Cheat Engine
Integrity Level:
HIGH
Description:
Cheat Engine
Exit code:
0
Version:
6.6.0.4880
Modules
Images
c:\users\admin\desktop\cheatengine\cheatengine-i386.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1660"C:\Users\admin\Desktop\CheatEngine\cheatengine-i386.exe" C:\Users\admin\Desktop\CheatEngine\cheatengine-i386.exe
explorer.exe
User:
admin
Company:
Cheat Engine
Integrity Level:
HIGH
Description:
Cheat Engine
Exit code:
0
Version:
6.6.0.4880
Modules
Images
c:\users\admin\desktop\cheatengine\cheatengine-i386.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2272"C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exe" C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
6.3.0.0
Modules
Images
c:\users\admin\desktop\cheatengine\cheat engine.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2552"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\CheatEngine.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2708"C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exe" C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
6.3.0.0
Modules
Images
c:\users\admin\desktop\cheatengine\cheat engine.exe
c:\systemroot\system32\ntdll.dll
2852"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\CheatEngine\autorun\Lua files in this folder get executed automatically.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2900"C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exe" C:\Users\admin\Desktop\CheatEngine\Cheat Engine.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
6.3.0.0
Modules
Images
c:\users\admin\desktop\cheatengine\cheat engine.exe
c:\systemroot\system32\ntdll.dll
3204"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe3_ Global\UsGthrCtrlFltPipeMssGthrPipe3 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 039
Read events
985
Write events
54
Delete events
0

Modification events

(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2552) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2552) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\CheatEngine.zip
(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
Executable files
46
Suspicious files
4
Text files
41
Unknown types
4

Dropped files

PID
Process
Filename
Type
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\allochook-i386.dllexecutable
MD5:
SHA256:
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\allochook-x86_64.dllexecutable
MD5:
SHA256:
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\64\CEJVMTI.dllexecutable
MD5:CEFC5C56720CA850CCB20FAF47733BD2
SHA256:F107DD69B4115864D289F364FAFC0E045FD3E9FC4BDE5586CE8C1BCF59CC65A7
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\CEJVMTI.htext
MD5:20AF26E2AB559DDC6CA1929834DA003E
SHA256:18C5FB7CB71EB7B2D1835CE44B24E09213AA885C1407E4E2401FBD2D74970D8E
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\dllmain.cpptext
MD5:66EFA1B79D7AEF68DFA369074ABC9CAA
SHA256:542E67D6247001859B6BB38C2AA085F5446371EB2F2385546E12D0BF275DE503
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\32\CEJVMTI.dllexecutable
MD5:B02FA5C8EEFBCD010AAAC97A94FF62BB
SHA256:7BD0D77FD790215BB67337F9F210B05AAAB0193D105B8FF86EC422E9875EB033
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\MonoDataCollector32.dllexecutable
MD5:21A2ED2E4C16DA67CE22ADE3422215F5
SHA256:91921C174C51019BE75514DD5D50F6DD58B4E7D06DA21DBC8A1EA5E3CE40564F
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\src\Common\Pipe.cpptext
MD5:9D38DBD8B60552BC2CB8585AD660B0DD
SHA256:6EE4E10D1FD3FC75BF105727CBB84550FD2DED37DCB5C0FF053B18D2302E5117
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\MonoDataCollector64.dllexecutable
MD5:43BBEAC528D0F7379C6708FCB9406FF0
SHA256:881C052F66543E4722E99C496B611412B3A7A869D0E02ADA9AB2C144297F1E15
2552WinRAR.exeC:\Users\admin\Desktop\CheatEngine\autorun\dlls\src\Common\Pipe.htext
MD5:86AC093E951A8CFA7FE1E020E8A61026
SHA256:B7758C2F97AB776B02FCAAB9D253277A96DCB318C66DD72D294A417290AAD761
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
cheatengine-i386.exe
Offset of LBR_Count=760
cheatengine-i386.exe
sizeof fxstate = 512
cheatengine-i386.exe
TSymhandler.create
cheatengine-i386.exe
TSymhandler.create 1
cheatengine-i386.exe
TSymhandler.create 2
cheatengine-i386.exe
TSymhandler.create 3
cheatengine-i386.exe
TSymbolListHandler.create 1
cheatengine-i386.exe
TSymbolListHandler.create 2
cheatengine-i386.exe
TSymbolListHandler.create exit
cheatengine-i386.exe
TSymhandler.create exit