Resubmissions

07-07-2023 19:28

230707-x6vx7aah77 10

09-05-2023 07:16

230509-h34zcsgf4w 8

27-03-2023 11:00

230327-m3yjssdb46 10

25-03-2023 07:43

230325-jkn1vsdh4z 8

25-02-2023 11:28

230225-nldnqsda92 10

25-02-2023 11:28

230225-nk69nada89 1

25-02-2023 11:24

230225-nh4qrada83 10

15-01-2023 04:46

230115-fd3c5aab55 10

06-12-2022 18:59

221206-xm59taea79 10

Analysis

  • max time kernel
    1203s
  • max time network
    875s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-de
  • resource tags

    arch:x64arch:x86image:win10-20220901-delocale:de-deos:windows10-1703-x64systemwindows
  • submitted
    26-11-2022 04:17

General

  • Target

    fucker script.exe

  • Size

    104KB

  • MD5

    db0655efbe0dbdef1df06207f5cb5b5b

  • SHA1

    a8d48d5c0042ce359178d018c0873e8a7c2f27e8

  • SHA256

    52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56

  • SHA512

    5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704

  • SSDEEP

    1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 41 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fucker script.exe
    "C:\Users\Admin\AppData\Local\Temp\fucker script.exe"
    1⤵
      PID:1848
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\StopPop.wmv"
      1⤵
        PID:2304
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\HideDismount.wm"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:4056
      • C:\Windows\system32\werfault.exe
        werfault.exe /h /shared Global\872b5473c2ee4ca7b7c0ce62d60b799d /t 2804 /p 2672
        1⤵
          PID:2456
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:3868
        • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
          1⤵
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:4916
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 4164 -s 2656
          1⤵
          • Program crash
          PID:4744

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1848-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/1848-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB