Analysis
-
max time kernel
167s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
25-06-2023 16:45
Behavioral task
behavioral1
Sample
Meinkraft Server DDoS'er.exe
Resource
win10-20230621-en
General
-
Target
Meinkraft Server DDoS'er.exe
-
Size
24.4MB
-
MD5
faed7172fb1d01e551578bf20bf0f922
-
SHA1
fb2d49680de7c68e1b27d1d4026080ae724188f7
-
SHA256
3970986b134943f64641442b257f30280226e8411ad2e7b0e474405adc18e975
-
SHA512
ee7805ea8a4c2790553721ed5087a2928bf5ea88f3e276df65cfa2bf397363eb30c414de6223ca23ca2f2d37c67555d4e9d15d06899f8379b1ad1047d706d847
-
SSDEEP
786432:52Uz7SPP3LfFrFrFrFrFrFmsPyfTZJwMlveOTS69:52Uz7SP/LfFrFrFrFrFrFHPATfFveOTz
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
Processes:
taskmgr.exetaskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Meinkraft Server DDoS'er.exetaskmgr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Meinkraft Server DDoS'er.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Meinkraft Server DDoS'er.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
AUDIODG.EXEtaskmgr.exetaskmgr.exedescription pid process Token: 33 4884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4884 AUDIODG.EXE Token: SeDebugPrivilege 4788 taskmgr.exe Token: SeSystemProfilePrivilege 4788 taskmgr.exe Token: SeCreateGlobalPrivilege 4788 taskmgr.exe Token: 33 4788 taskmgr.exe Token: SeIncBasePriorityPrivilege 4788 taskmgr.exe Token: SeDebugPrivilege 4988 taskmgr.exe Token: SeSystemProfilePrivilege 4988 taskmgr.exe Token: SeCreateGlobalPrivilege 4988 taskmgr.exe Token: 33 4988 taskmgr.exe Token: SeIncBasePriorityPrivilege 4988 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe 4988 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Meinkraft Server DDoS'er.exepid process 3940 Meinkraft Server DDoS'er.exe 3940 Meinkraft Server DDoS'er.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Meinkraft Server DDoS'er.exe"C:\Users\Admin\AppData\Local\Temp\Meinkraft Server DDoS'er.exe"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3b41⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\1601268389\3877292338.priFilesize
162KB
MD50d02b03a068d671348931cc20c048422
SHA167b6deacf1303acfcbab0b158157fdc03a02c8d5
SHA25644f4263d65889ea8f0db3c6e31a956a4664e9200aba2612c9be7016feeb323c0
SHA512805e7b4fafed39dec5ecc2ede0c65b6e103e6757e0bd43ecdce7c00932f59e3e7a68d2ea0818244dfeb691b022c1ccca590a3f4239f99e1cd8a29ba66daed358
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\4183903823\810424605.priFilesize
2KB
MD5a2942665b12ed000cd2ac95adef8e0cc
SHA1ac194f8d30f659131d1c73af8d44e81eccab7fde
SHA256bdc5de6c42c523a333c26160d212c62385b03f5ebdae5aa8c5d025ff3f8aa374
SHA5124e5ba962ba97656974c390b45302d60f4c82d604feb6199d44e80497a40d0b0a9fd119ca17ac184809ca0821ab6813292892c433ed7277f65c275f37a96070b9
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxxFilesize
379B
MD59a86aaaf3235a7fe0b85e4b3bf4cbdb9
SHA15dd34ce2103ea948981cfa784cdd537246f7ef77
SHA2560fa298e52c17a5d4d382cdf71ae73dee9fc3251b4f2ecfde29ffa0986a76b142
SHA512d3e9a03c28c8ddb313c5ba3f517c7bf59a05fd17befb810440d8e230e08b669d004ed46dfcc8f01dcd94347342d96c4d887c4cca2507d8953259001aaf5e200f
-
memory/3940-647-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-666-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-137-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-221-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-463-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-483-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-494-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-516-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-611-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-117-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-665-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-143-0x0000000003780000-0x0000000003781000-memory.dmpFilesize
4KB
-
memory/3940-667-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-675-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-676-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-677-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-688-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-119-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-118-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-693-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB
-
memory/3940-694-0x0000000000F70000-0x00000000030B2000-memory.dmpFilesize
33.3MB