Overview
overview
10Static
static
10TrashMalwa...in.exe
windows10-2004-x64
8TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...nk.exe
windows10-2004-x64
8TrashMalwa...oN.bat
windows10-2004-x64
8TrashMalwa...zz.exe
windows10-2004-x64
6TrashMalwa...de.exe
windows10-2004-x64
8TrashMalwa...20.exe
windows10-2004-x64
7TrashMalwa...ll.exe
windows10-2004-x64
8TrashMalwa...le.exe
windows10-2004-x64
8TrashMalwa...oe.bat
windows10-2004-x64
TrashMalwa....0.exe
windows10-2004-x64
7TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa...ic.exe
windows10-2004-x64
6TrashMalwa...OD.exe
windows10-2004-x64
10TrashMalwa...um.exe
windows10-2004-x64
6TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...MZ.exe
windows10-2004-x64
1TrashMalwa...ch.exe
windows10-2004-x64
8TrashMalwa....5.exe
windows10-2004-x64
8TrashMalwa...ol.exe
windows10-2004-x64
8TrashMalwa...hm.exe
windows10-2004-x64
10TrashMalwa...10.exe
windows10-2004-x64
7TrashMalwa...V6.exe
windows10-2004-x64
7TrashMalwa.../x.exe
windows10-2004-x64
7Analysis
-
max time kernel
299s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 14:13
Behavioral task
behavioral1
Sample
TrashMalwares-main/AcidRain.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
TrashMalwares-main/Antivirus_Installer.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
TrashMalwares-main/Dro trojan. Virus prank.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
TrashMalwares-main/FaZoN.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
TrashMalwares-main/Fizz.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
TrashMalwares-main/Ginxide.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
TrashMalwares-main/Install Windows20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
TrashMalwares-main/MS-RickRoll.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
TrashMalwares-main/MercuryXhoffle.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral10
Sample
TrashMalwares-main/NetPakoe.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
TrashMalwares-main/NetPakoe3.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
TrashMalwares-main/NoEscape8.0.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
TrashMalwares-main/PC shaking v4.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
TrashMalwares-main/Phsyletric.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
TrashMalwares-main/RealBSOD.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
TrashMalwares-main/Sankylium.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
TrashMalwares-main/SuperWacker.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral18
Sample
TrashMalwares-main/TEMZ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
TrashMalwares-main/ach.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral20
Sample
TrashMalwares-main/even0.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
TrashMalwares-main/lol.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
TrashMalwares-main/mhm.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
TrashMalwares-main/winnit6.6.6 V10.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral24
Sample
TrashMalwares-main/winnit6.6.6_V6.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
TrashMalwares-main/x.exe
Resource
win10v2004-20220812-en
General
-
Target
TrashMalwares-main/MS-RickRoll.exe
-
Size
19.6MB
-
MD5
f2ac7d7d538e97ffb162fe63ca395a05
-
SHA1
a283014d55873fba0f00fc4b030581254610639a
-
SHA256
ccbb3d3838216d5a5881fc256c10d5d560885cc18a14a76461c9fe872af3bf0f
-
SHA512
50784fb9705733e45541eeb9df83e73d8f530bffd87ad99ae37c23c8a9c216d583a193f58046ea49e5c727d5aa9154d583911706feda56531ea45f3438194e96
-
SSDEEP
393216:+rl0rPQCLXuOSk2+t7DPQCLXuOSk2+t7Vl01:w6dLrNJtvdLrNJtJ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
mbr.exe._cache_mbr.exeSynaptics.exepid process 2440 mbr.exe 4876 ._cache_mbr.exe 1112 Synaptics.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MS-RickRoll.exembr.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation MS-RickRoll.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mbr.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
mbr.exe._cache_mbr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" mbr.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run ._cache_mbr.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\TrashMalwares-main\\._cache_mbr.exe" ._cache_mbr.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
._cache_mbr.exedescription ioc process File opened for modification \??\PhysicalDrive0 ._cache_mbr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
Processes:
mbr.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ mbr.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2068 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
MS-RickRoll.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 1904 MS-RickRoll.exe Token: SeDebugPrivilege 1904 MS-RickRoll.exe Token: 33 3384 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3384 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
EXCEL.EXEpid process 2068 EXCEL.EXE 2068 EXCEL.EXE 2068 EXCEL.EXE 2068 EXCEL.EXE 2068 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MS-RickRoll.exembr.exe._cache_mbr.exedescription pid process target process PID 1904 wrote to memory of 2440 1904 MS-RickRoll.exe mbr.exe PID 1904 wrote to memory of 2440 1904 MS-RickRoll.exe mbr.exe PID 1904 wrote to memory of 2440 1904 MS-RickRoll.exe mbr.exe PID 2440 wrote to memory of 4876 2440 mbr.exe ._cache_mbr.exe PID 2440 wrote to memory of 4876 2440 mbr.exe ._cache_mbr.exe PID 2440 wrote to memory of 4876 2440 mbr.exe ._cache_mbr.exe PID 4876 wrote to memory of 4340 4876 ._cache_mbr.exe schtasks.exe PID 4876 wrote to memory of 4340 4876 ._cache_mbr.exe schtasks.exe PID 4876 wrote to memory of 4340 4876 ._cache_mbr.exe schtasks.exe PID 2440 wrote to memory of 1112 2440 mbr.exe Synaptics.exe PID 2440 wrote to memory of 1112 2440 mbr.exe Synaptics.exe PID 2440 wrote to memory of 1112 2440 mbr.exe Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\MS-RickRoll.exe"C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\MS-RickRoll.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\mbr.exe"C:\mbr.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\._cache_mbr.exe"C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\._cache_mbr.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\._cache_mbr.exe"1⤵
- Creates scheduled task(s)
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x460 0x45c1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
753KB
MD5d39c83fa94398010bc7a281fcd781369
SHA1cf0352fe8bd177507456f65c54c806fe1ca85507
SHA256e173266e3d9af60add936ab2b0de936d1e35fa85556ea5c60bad7c75e818c4e3
SHA5125688c1d2a02fa4d2da2d3711a3cea12e6f8585eb9d7d28df0fc5f835be075e371e5ac1f991352beb9a71b9fcd1f32f744e7af7b8068095f1bffceebdb711daa4
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
753KB
MD5d39c83fa94398010bc7a281fcd781369
SHA1cf0352fe8bd177507456f65c54c806fe1ca85507
SHA256e173266e3d9af60add936ab2b0de936d1e35fa85556ea5c60bad7c75e818c4e3
SHA5125688c1d2a02fa4d2da2d3711a3cea12e6f8585eb9d7d28df0fc5f835be075e371e5ac1f991352beb9a71b9fcd1f32f744e7af7b8068095f1bffceebdb711daa4
-
C:\Users\Admin\AppData\Local\Temp\LX3M63yy.xlsmFilesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\._cache_mbr.exeFilesize
150KB
MD5578650d2b82375bb0f6be3a9108585b0
SHA18f25b9a24254c2ec99ee5625c70a0ae7067dc68b
SHA2565ee16b324a60878ccef849bec862a4fa551cb304d8ce4056d49df10fb8ec9f2f
SHA5124c46d53bab8df399a63b33ac4c4bba2c99663b31fcd3ebb6bd01a9ccf1648a61a7034879fafced99adb9c60388590efb4462e404b9d5da7d8e2e60b480ffc657
-
C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\._cache_mbr.exeFilesize
150KB
MD5578650d2b82375bb0f6be3a9108585b0
SHA18f25b9a24254c2ec99ee5625c70a0ae7067dc68b
SHA2565ee16b324a60878ccef849bec862a4fa551cb304d8ce4056d49df10fb8ec9f2f
SHA5124c46d53bab8df399a63b33ac4c4bba2c99663b31fcd3ebb6bd01a9ccf1648a61a7034879fafced99adb9c60388590efb4462e404b9d5da7d8e2e60b480ffc657
-
C:\mbr.exeFilesize
904KB
MD5c85aa1da29f23a5a711e2793d0630b5a
SHA1e079ef1963a710db2e35380e508eef86ff371fb1
SHA256a19c688c6bebe44cc77ecf6bd998bb4f1799cefc91c5bd32cc8d6381e0177139
SHA512162e75f513518d5979f3c4a0e7ca6bf4b4333646bebee73a703c43c67c735f6ed244db25674f786881061418600123e92265e51e9ee5b6d34669ef71b72038cc
-
C:\mbr.exeFilesize
904KB
MD5c85aa1da29f23a5a711e2793d0630b5a
SHA1e079ef1963a710db2e35380e508eef86ff371fb1
SHA256a19c688c6bebe44cc77ecf6bd998bb4f1799cefc91c5bd32cc8d6381e0177139
SHA512162e75f513518d5979f3c4a0e7ca6bf4b4333646bebee73a703c43c67c735f6ed244db25674f786881061418600123e92265e51e9ee5b6d34669ef71b72038cc
-
memory/1112-141-0x0000000000000000-mapping.dmp
-
memory/1904-152-0x00007FFD33290000-0x00007FFD33D51000-memory.dmpFilesize
10.8MB
-
memory/1904-165-0x0000000025416000-0x000000002541B000-memory.dmpFilesize
20KB
-
memory/1904-174-0x0000000025436000-0x000000002543F000-memory.dmpFilesize
36KB
-
memory/1904-173-0x0000000025436000-0x000000002543F000-memory.dmpFilesize
36KB
-
memory/1904-172-0x000000002542D000-0x0000000025436000-memory.dmpFilesize
36KB
-
memory/1904-171-0x000000002542D000-0x0000000025436000-memory.dmpFilesize
36KB
-
memory/1904-170-0x0000000025424000-0x000000002542D000-memory.dmpFilesize
36KB
-
memory/1904-169-0x0000000025424000-0x000000002542D000-memory.dmpFilesize
36KB
-
memory/1904-168-0x000000002541B000-0x0000000025424000-memory.dmpFilesize
36KB
-
memory/1904-167-0x000000002541B000-0x0000000025424000-memory.dmpFilesize
36KB
-
memory/1904-166-0x0000000025416000-0x000000002541B000-memory.dmpFilesize
20KB
-
memory/1904-133-0x00007FFD33290000-0x00007FFD33D51000-memory.dmpFilesize
10.8MB
-
memory/1904-132-0x0000000000E60000-0x0000000002202000-memory.dmpFilesize
19.6MB
-
memory/1904-153-0x000000001DEA9000-0x000000001DEAF000-memory.dmpFilesize
24KB
-
memory/1904-154-0x000000001DEA9000-0x000000001DEAF000-memory.dmpFilesize
24KB
-
memory/1904-155-0x0000000025400000-0x0000000025404000-memory.dmpFilesize
16KB
-
memory/1904-156-0x0000000025400000-0x0000000025404000-memory.dmpFilesize
16KB
-
memory/1904-157-0x0000000025404000-0x0000000025407000-memory.dmpFilesize
12KB
-
memory/1904-158-0x0000000025404000-0x0000000025407000-memory.dmpFilesize
12KB
-
memory/1904-159-0x0000000025407000-0x000000002540C000-memory.dmpFilesize
20KB
-
memory/1904-160-0x0000000025407000-0x000000002540C000-memory.dmpFilesize
20KB
-
memory/1904-161-0x000000002540C000-0x0000000025411000-memory.dmpFilesize
20KB
-
memory/1904-162-0x000000002540C000-0x0000000025411000-memory.dmpFilesize
20KB
-
memory/1904-163-0x0000000025411000-0x0000000025416000-memory.dmpFilesize
20KB
-
memory/1904-164-0x0000000025411000-0x0000000025416000-memory.dmpFilesize
20KB
-
memory/2068-150-0x00007FFD0FD40000-0x00007FFD0FD50000-memory.dmpFilesize
64KB
-
memory/2068-149-0x00007FFD0FD40000-0x00007FFD0FD50000-memory.dmpFilesize
64KB
-
memory/2068-148-0x00007FFD121B0000-0x00007FFD121C0000-memory.dmpFilesize
64KB
-
memory/2068-147-0x00007FFD121B0000-0x00007FFD121C0000-memory.dmpFilesize
64KB
-
memory/2068-145-0x00007FFD121B0000-0x00007FFD121C0000-memory.dmpFilesize
64KB
-
memory/2068-146-0x00007FFD121B0000-0x00007FFD121C0000-memory.dmpFilesize
64KB
-
memory/2068-144-0x00007FFD121B0000-0x00007FFD121C0000-memory.dmpFilesize
64KB
-
memory/2440-134-0x0000000000000000-mapping.dmp
-
memory/4340-140-0x0000000000000000-mapping.dmp
-
memory/4876-137-0x0000000000000000-mapping.dmp