Overview
overview
10Static
static
10TrashMalwa...in.exe
windows10-2004-x64
8TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...nk.exe
windows10-2004-x64
8TrashMalwa...oN.bat
windows10-2004-x64
8TrashMalwa...zz.exe
windows10-2004-x64
6TrashMalwa...de.exe
windows10-2004-x64
8TrashMalwa...20.exe
windows10-2004-x64
7TrashMalwa...ll.exe
windows10-2004-x64
8TrashMalwa...le.exe
windows10-2004-x64
8TrashMalwa...oe.bat
windows10-2004-x64
TrashMalwa....0.exe
windows10-2004-x64
7TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa...ic.exe
windows10-2004-x64
6TrashMalwa...OD.exe
windows10-2004-x64
10TrashMalwa...um.exe
windows10-2004-x64
6TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...MZ.exe
windows10-2004-x64
1TrashMalwa...ch.exe
windows10-2004-x64
8TrashMalwa....5.exe
windows10-2004-x64
8TrashMalwa...ol.exe
windows10-2004-x64
8TrashMalwa...hm.exe
windows10-2004-x64
10TrashMalwa...10.exe
windows10-2004-x64
7TrashMalwa...V6.exe
windows10-2004-x64
7TrashMalwa.../x.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 14:13
Behavioral task
behavioral1
Sample
TrashMalwares-main/AcidRain.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
TrashMalwares-main/Antivirus_Installer.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
TrashMalwares-main/Dro trojan. Virus prank.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
TrashMalwares-main/FaZoN.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
TrashMalwares-main/Fizz.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
TrashMalwares-main/Ginxide.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
TrashMalwares-main/Install Windows20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
TrashMalwares-main/MS-RickRoll.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
TrashMalwares-main/MercuryXhoffle.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral10
Sample
TrashMalwares-main/NetPakoe.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
TrashMalwares-main/NetPakoe3.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
TrashMalwares-main/NoEscape8.0.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
TrashMalwares-main/PC shaking v4.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
TrashMalwares-main/Phsyletric.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
TrashMalwares-main/RealBSOD.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
TrashMalwares-main/Sankylium.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
TrashMalwares-main/SuperWacker.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral18
Sample
TrashMalwares-main/TEMZ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
TrashMalwares-main/ach.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral20
Sample
TrashMalwares-main/even0.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
TrashMalwares-main/lol.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
TrashMalwares-main/mhm.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
TrashMalwares-main/winnit6.6.6 V10.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral24
Sample
TrashMalwares-main/winnit6.6.6_V6.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
TrashMalwares-main/x.exe
Resource
win10v2004-20220812-en
General
-
Target
TrashMalwares-main/SuperWacker.exe
-
Size
335KB
-
MD5
57e07c87d9ad4831c2f54584b8805901
-
SHA1
e8701ced964d08f7d4be70814e457f292bf798ca
-
SHA256
38cd530d4c48b9e3e9ba7a43f5c34404ead13237f7db093142103a94b82ff5b0
-
SHA512
85632a293b5c05ebff197ca1667a50c3b0a4d35c0bbc469af82764447dbc73111395fa213a6903a5f1447fb809a2ae49584b2fe54549f6782a990638602aa5eb
-
SSDEEP
6144:6D4m3lEo62uPK9T9rak9gora16oTllf28gO:6DX3juZk9goratll7gO
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
mbr.execircle.exewaves.execircle.exebsod.exepid process 4616 mbr.exe 4496 circle.exe 4500 waves.exe 540 circle.exe 2452 bsod.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SuperWacker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SuperWacker.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mbr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run mbr.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3160.tmp\\mbr.exe" mbr.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
mbr.exedescription ioc process File opened for modification \??\PhysicalDrive0 mbr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 532 timeout.exe 256 timeout.exe 2828 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 2572 taskkill.exe 3708 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exetaskkill.exebsod.exedescription pid process Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 3708 taskkill.exe Token: SeShutdownPrivilege 2452 bsod.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
SuperWacker.execmd.exembr.exedescription pid process target process PID 3352 wrote to memory of 3700 3352 SuperWacker.exe cmd.exe PID 3352 wrote to memory of 3700 3352 SuperWacker.exe cmd.exe PID 3700 wrote to memory of 4616 3700 cmd.exe mbr.exe PID 3700 wrote to memory of 4616 3700 cmd.exe mbr.exe PID 3700 wrote to memory of 4616 3700 cmd.exe mbr.exe PID 3700 wrote to memory of 4496 3700 cmd.exe circle.exe PID 3700 wrote to memory of 4496 3700 cmd.exe circle.exe PID 3700 wrote to memory of 4496 3700 cmd.exe circle.exe PID 3700 wrote to memory of 256 3700 cmd.exe timeout.exe PID 3700 wrote to memory of 256 3700 cmd.exe timeout.exe PID 4616 wrote to memory of 216 4616 mbr.exe schtasks.exe PID 4616 wrote to memory of 216 4616 mbr.exe schtasks.exe PID 4616 wrote to memory of 216 4616 mbr.exe schtasks.exe PID 3700 wrote to memory of 2572 3700 cmd.exe taskkill.exe PID 3700 wrote to memory of 2572 3700 cmd.exe taskkill.exe PID 3700 wrote to memory of 4500 3700 cmd.exe waves.exe PID 3700 wrote to memory of 4500 3700 cmd.exe waves.exe PID 3700 wrote to memory of 4500 3700 cmd.exe waves.exe PID 3700 wrote to memory of 2828 3700 cmd.exe timeout.exe PID 3700 wrote to memory of 2828 3700 cmd.exe timeout.exe PID 3700 wrote to memory of 3708 3700 cmd.exe taskkill.exe PID 3700 wrote to memory of 3708 3700 cmd.exe taskkill.exe PID 3700 wrote to memory of 540 3700 cmd.exe circle.exe PID 3700 wrote to memory of 540 3700 cmd.exe circle.exe PID 3700 wrote to memory of 540 3700 cmd.exe circle.exe PID 3700 wrote to memory of 532 3700 cmd.exe timeout.exe PID 3700 wrote to memory of 532 3700 cmd.exe timeout.exe PID 3700 wrote to memory of 2452 3700 cmd.exe bsod.exe PID 3700 wrote to memory of 2452 3700 cmd.exe bsod.exe PID 3700 wrote to memory of 2452 3700 cmd.exe bsod.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\SuperWacker.exe"C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\SuperWacker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3160.tmp\3161.bat C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\SuperWacker.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\mbr.exembr.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\3160.tmp\mbr.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\circle.execircle.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\timeout.exetimeout 63⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\taskkill.exetaskkill /f /im cricle.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\waves.exewaves.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\timeout.exetimeout 703⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\taskkill.exetaskkill /f /im waves.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\circle.execircle.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\timeout.exetimeout 703⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\bsod.exebsod.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\3161.batFilesize
187B
MD5a9342e412034e05dd5c28ad409eaf4bc
SHA12d08249b9a48f07026ad4a34b318a9f41bcb3f74
SHA2560cb6b7129654719a014dca360e330b2b225d36c8d2279af101dbd401d2c277b4
SHA512e1dfac8087819cccfafe596bcc4379d2273c6049056080e4deb1772f7c4a63185ce21835f5f9523137b690e3be66933e816fec24d7c7785a09b38beb4aa259c1
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\bsod.exeFilesize
102KB
MD530c6ece6db96626bae93be86db0990e1
SHA102a452be27b46474fca6d82580ffe76133aff5a3
SHA256b1459f6ade9be379c20ce8fdf65f425e241ab96c8e799de25c352b7dd0978d47
SHA51296b866a0d965f268ce5453156866b39972a59478ce25f5c228659f774643d2739b4f0081077f19bc55a3f1ef18091a2b1a16053a69588f3e15a583ab9b7136f3
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\bsod.exeFilesize
102KB
MD530c6ece6db96626bae93be86db0990e1
SHA102a452be27b46474fca6d82580ffe76133aff5a3
SHA256b1459f6ade9be379c20ce8fdf65f425e241ab96c8e799de25c352b7dd0978d47
SHA51296b866a0d965f268ce5453156866b39972a59478ce25f5c228659f774643d2739b4f0081077f19bc55a3f1ef18091a2b1a16053a69588f3e15a583ab9b7136f3
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\circle.exeFilesize
12KB
MD5ed169e40a69cf73fd3ac59215b24063f
SHA132d49462e74e6c08b941d8cd530a5f3c0f3b5764
SHA256b8ffde2fc69292ffa1a704a1cf977eedfc86277a61d4937245d218d22674178c
SHA512f949a7b9b5dae91f887e7ce9bb45f7500534873d3baab5f5c2b1c31b1e185e70278ceb9d4f03f495460e0fb96399239fa678b0b4750ee870cbaa6333ab5ebb6c
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\circle.exeFilesize
12KB
MD5ed169e40a69cf73fd3ac59215b24063f
SHA132d49462e74e6c08b941d8cd530a5f3c0f3b5764
SHA256b8ffde2fc69292ffa1a704a1cf977eedfc86277a61d4937245d218d22674178c
SHA512f949a7b9b5dae91f887e7ce9bb45f7500534873d3baab5f5c2b1c31b1e185e70278ceb9d4f03f495460e0fb96399239fa678b0b4750ee870cbaa6333ab5ebb6c
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\circle.exeFilesize
12KB
MD5ed169e40a69cf73fd3ac59215b24063f
SHA132d49462e74e6c08b941d8cd530a5f3c0f3b5764
SHA256b8ffde2fc69292ffa1a704a1cf977eedfc86277a61d4937245d218d22674178c
SHA512f949a7b9b5dae91f887e7ce9bb45f7500534873d3baab5f5c2b1c31b1e185e70278ceb9d4f03f495460e0fb96399239fa678b0b4750ee870cbaa6333ab5ebb6c
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\mbr.exeFilesize
101KB
MD552e2c0513dc998dcb486a87dcaebd040
SHA1fda3c535c9a9425e8e0d2f2be3584280f4d15dc9
SHA256095d1eba5b8f50305a0ad75c8b1879b872437ef7e884588944953bc63005430e
SHA5125ec0d3ffe423af847800186e3932460674eef8a38f887623d32e47c02aec971571dd46c0f8a157ab16a5ffe020a89ba25e40e62326081915f04de6c202a58d95
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\mbr.exeFilesize
101KB
MD552e2c0513dc998dcb486a87dcaebd040
SHA1fda3c535c9a9425e8e0d2f2be3584280f4d15dc9
SHA256095d1eba5b8f50305a0ad75c8b1879b872437ef7e884588944953bc63005430e
SHA5125ec0d3ffe423af847800186e3932460674eef8a38f887623d32e47c02aec971571dd46c0f8a157ab16a5ffe020a89ba25e40e62326081915f04de6c202a58d95
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\waves.exeFilesize
41KB
MD5d8e680ae1d2edd79fc67b784b3a47921
SHA1c17dc567d2734a0e15c9d1d59808d56d1ae2da25
SHA256df6dcaef3930c089873e74f85ec7f6bf390f84bb173be3323d0b79262c4ee6d4
SHA51296bd83a8d79adc9235f0e7f16fdecfa0e084facc163765737d2a8c89eaaaad04daed561e90a299eba9303043e0b6bdbba63bc2af8a875ec435d585ec84013fba
-
C:\Users\Admin\AppData\Local\Temp\3160.tmp\waves.exeFilesize
41KB
MD5d8e680ae1d2edd79fc67b784b3a47921
SHA1c17dc567d2734a0e15c9d1d59808d56d1ae2da25
SHA256df6dcaef3930c089873e74f85ec7f6bf390f84bb173be3323d0b79262c4ee6d4
SHA51296bd83a8d79adc9235f0e7f16fdecfa0e084facc163765737d2a8c89eaaaad04daed561e90a299eba9303043e0b6bdbba63bc2af8a875ec435d585ec84013fba
-
memory/216-141-0x0000000000000000-mapping.dmp
-
memory/256-139-0x0000000000000000-mapping.dmp
-
memory/532-150-0x0000000000000000-mapping.dmp
-
memory/540-148-0x0000000000000000-mapping.dmp
-
memory/2452-151-0x0000000000000000-mapping.dmp
-
memory/2572-142-0x0000000000000000-mapping.dmp
-
memory/2828-146-0x0000000000000000-mapping.dmp
-
memory/3700-132-0x0000000000000000-mapping.dmp
-
memory/3708-147-0x0000000000000000-mapping.dmp
-
memory/4496-136-0x0000000000000000-mapping.dmp
-
memory/4500-143-0x0000000000000000-mapping.dmp
-
memory/4616-134-0x0000000000000000-mapping.dmp