Analysis
-
max time kernel
133s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 12:49
Static task
static1
Behavioral task
behavioral1
Sample
SystemCrasher_ByDaniel.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
SystemCrasher_ByDaniel.exe
Resource
win10v2004-20230621-en
General
-
Target
SystemCrasher_ByDaniel.exe
-
Size
296KB
-
MD5
fe6bb808dff8cb1a8571a1a07dbafe89
-
SHA1
5611d48b3998ca8d428cd19f8ad85c30e1e54686
-
SHA256
b14a43816be48e5624a82bc768011389daf67645ae8cfe2078a9ee523d8e8afe
-
SHA512
4ac28bb677c6808159b5cc1edc7562e1d220b5e3552ac6c817d558804e347107f560e07caaab67ff3530134eccac62a8bb877836adc5e7cff5504f3977d60d61
-
SSDEEP
6144:Et5hBPi0BW69hd1MMdxPe9N9uA069TBIcr7tGuHo67g7GnJaKeOnSlt6iPigOqZt:Etzww69Ta0ZGuVLJat/lsiPigO0npUq
Malware Config
Signatures
-
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 820 cmd.exe -
Suspicious use of SetWindowsHookEx 57 IoCs
pid Process 672 mspaint.exe 2012 wordpad.exe 1028 wordpad.exe 2012 wordpad.exe 1028 wordpad.exe 1028 wordpad.exe 2012 wordpad.exe 1460 wordpad.exe 1460 wordpad.exe 2012 wordpad.exe 2012 wordpad.exe 1028 wordpad.exe 1028 wordpad.exe 1460 wordpad.exe 1460 wordpad.exe 1460 wordpad.exe 672 mspaint.exe 672 mspaint.exe 672 mspaint.exe 1948 mspaint.exe 1948 mspaint.exe 1852 wordpad.exe 1948 mspaint.exe 1948 mspaint.exe 1852 wordpad.exe 1584 wordpad.exe 1852 wordpad.exe 1584 wordpad.exe 1584 wordpad.exe 1944 wordpad.exe 1944 wordpad.exe 1944 wordpad.exe 1584 wordpad.exe 1584 wordpad.exe 1852 wordpad.exe 1852 wordpad.exe 1944 wordpad.exe 1944 wordpad.exe 1160 mspaint.exe 1160 mspaint.exe 1160 mspaint.exe 1160 mspaint.exe 1724 wordpad.exe 1724 wordpad.exe 1724 wordpad.exe 996 wordpad.exe 996 wordpad.exe 996 wordpad.exe 996 wordpad.exe 996 wordpad.exe 1540 wordpad.exe 1540 wordpad.exe 1540 wordpad.exe 1724 wordpad.exe 1724 wordpad.exe 1540 wordpad.exe 1540 wordpad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 820 1428 SystemCrasher_ByDaniel.exe 28 PID 1428 wrote to memory of 820 1428 SystemCrasher_ByDaniel.exe 28 PID 1428 wrote to memory of 820 1428 SystemCrasher_ByDaniel.exe 28 PID 820 wrote to memory of 1548 820 cmd.exe 30 PID 820 wrote to memory of 1548 820 cmd.exe 30 PID 820 wrote to memory of 1548 820 cmd.exe 30 PID 820 wrote to memory of 1196 820 cmd.exe 31 PID 820 wrote to memory of 1196 820 cmd.exe 31 PID 820 wrote to memory of 1196 820 cmd.exe 31 PID 820 wrote to memory of 468 820 cmd.exe 33 PID 820 wrote to memory of 468 820 cmd.exe 33 PID 820 wrote to memory of 468 820 cmd.exe 33 PID 820 wrote to memory of 560 820 cmd.exe 32 PID 820 wrote to memory of 560 820 cmd.exe 32 PID 820 wrote to memory of 560 820 cmd.exe 32 PID 820 wrote to memory of 1636 820 cmd.exe 35 PID 820 wrote to memory of 1636 820 cmd.exe 35 PID 820 wrote to memory of 1636 820 cmd.exe 35 PID 820 wrote to memory of 672 820 cmd.exe 36 PID 820 wrote to memory of 672 820 cmd.exe 36 PID 820 wrote to memory of 672 820 cmd.exe 36 PID 820 wrote to memory of 1000 820 cmd.exe 37 PID 820 wrote to memory of 1000 820 cmd.exe 37 PID 820 wrote to memory of 1000 820 cmd.exe 37 PID 820 wrote to memory of 768 820 cmd.exe 38 PID 820 wrote to memory of 768 820 cmd.exe 38 PID 820 wrote to memory of 768 820 cmd.exe 38 PID 820 wrote to memory of 1624 820 cmd.exe 39 PID 820 wrote to memory of 1624 820 cmd.exe 39 PID 820 wrote to memory of 1624 820 cmd.exe 39 PID 820 wrote to memory of 1924 820 cmd.exe 41 PID 820 wrote to memory of 1924 820 cmd.exe 41 PID 820 wrote to memory of 1924 820 cmd.exe 41 PID 820 wrote to memory of 812 820 cmd.exe 40 PID 820 wrote to memory of 812 820 cmd.exe 40 PID 820 wrote to memory of 812 820 cmd.exe 40 PID 1924 wrote to memory of 1028 1924 write.exe 43 PID 1924 wrote to memory of 1028 1924 write.exe 43 PID 1924 wrote to memory of 1028 1924 write.exe 43 PID 768 wrote to memory of 2012 768 write.exe 42 PID 768 wrote to memory of 2012 768 write.exe 42 PID 768 wrote to memory of 2012 768 write.exe 42 PID 820 wrote to memory of 1944 820 cmd.exe 44 PID 820 wrote to memory of 1944 820 cmd.exe 44 PID 820 wrote to memory of 1944 820 cmd.exe 44 PID 820 wrote to memory of 808 820 cmd.exe 45 PID 820 wrote to memory of 808 820 cmd.exe 45 PID 820 wrote to memory of 808 820 cmd.exe 45 PID 1944 wrote to memory of 1460 1944 write.exe 46 PID 1944 wrote to memory of 1460 1944 write.exe 46 PID 1944 wrote to memory of 1460 1944 write.exe 46 PID 820 wrote to memory of 1068 820 cmd.exe 47 PID 820 wrote to memory of 1068 820 cmd.exe 47 PID 820 wrote to memory of 1068 820 cmd.exe 47 PID 820 wrote to memory of 1672 820 cmd.exe 48 PID 820 wrote to memory of 1672 820 cmd.exe 48 PID 820 wrote to memory of 1672 820 cmd.exe 48 PID 1672 wrote to memory of 1884 1672 net.exe 50 PID 1672 wrote to memory of 1884 1672 net.exe 50 PID 1672 wrote to memory of 1884 1672 net.exe 50 PID 820 wrote to memory of 1196 820 cmd.exe 51 PID 820 wrote to memory of 1196 820 cmd.exe 51 PID 820 wrote to memory of 1196 820 cmd.exe 51 PID 1196 wrote to memory of 1844 1196 net.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\SystemCrasher_ByDaniel.exe"C:\Users\Admin\AppData\Local\Temp\SystemCrasher_ByDaniel.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FDD0.tmp\FDD1.tmp\FDD2.bat C:\Users\Admin\AppData\Local\Temp\SystemCrasher_ByDaniel.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\calc.execalc3⤵PID:1548
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1196
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:560
-
-
C:\Windows\explorer.exeexplorer3⤵PID:468
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1636
-
-
C:\Windows\system32\mspaint.exemspaint3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:672
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1000
-
-
C:\Windows\system32\write.exewrite3⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1624
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:812
-
-
C:\Windows\system32\write.exewrite3⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
-
C:\Windows\system32\write.exewrite3⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:808
-
-
C:\Windows\system32\control.execontrol3⤵PID:1068
-
-
C:\Windows\system32\net.exenet user DANIEL TROJAN /add3⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user DANIEL TROJAN /add4⤵PID:1884
-
-
-
C:\Windows\system32\net.exenet user 2231 /add3⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 2231 /add4⤵PID:1844
-
-
-
C:\Windows\system32\net.exenet user YOUR PC IS TRASHED BY DANIEL /add3⤵PID:1744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user YOUR PC IS TRASHED BY DANIEL /add4⤵PID:1512
-
-
-
C:\Windows\system32\calc.execalc3⤵PID:1544
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1580
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1516
-
-
C:\Windows\explorer.exeexplorer3⤵PID:1940
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1036
-
-
C:\Windows\system32\mspaint.exemspaint3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1848
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1676
-
-
C:\Windows\system32\write.exewrite3⤵PID:1512
-
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
-
C:\Windows\system32\write.exewrite3⤵PID:548
-
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1796
-
-
C:\Windows\system32\write.exewrite3⤵PID:1940
-
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1764
-
-
C:\Windows\system32\control.execontrol3⤵PID:1636
-
-
C:\Windows\system32\calc.execalc3⤵PID:1928
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:920
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:520
-
-
C:\Windows\explorer.exeexplorer3⤵PID:1312
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1408
-
-
C:\Windows\system32\mspaint.exemspaint3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1160
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1540
-
-
C:\Windows\system32\write.exewrite3⤵PID:1604
-
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1888
-
-
C:\Windows\system32\write.exewrite3⤵PID:1980
-
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:996
-
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:572
-
-
C:\Windows\system32\write.exewrite3⤵PID:1312
-
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1456
-
-
C:\Windows\system32\control.execontrol3⤵PID:1888
-
-
C:\Windows\system32\calc.execalc3⤵PID:1296
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:652
-
-
C:\Windows\system32\msg.exemsg * Looks Your OS Has Been Trashed By The Daniel Trojan Malware. Make Sure Have Fun And Enjoy Your System Destroyed! -Daniel3⤵PID:1408
-
-
C:\Windows\explorer.exeexplorer3⤵PID:288
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5abe73cfada21f9c25c517bdb245da915
SHA172e733b0fff0d55434bf0ac70fa45bbdbfa61774
SHA256223449ea63e12906be577ce45d82ee688a55d9f874dc7fe243d9c2c085324182
SHA512179f6abc2da020046fc3b61ef39cd1a0da1c00f1c62e4a4b00daac72f8f04550023067ff7f7da37cc8cb45474c7f146070c80022edf14556cb057643305b65ce
-
Filesize
56KB
MD5bd72dcf1083b6e22ccbfa0e8e27fb1e0
SHA13fd23d4f14da768da7b8364d74c54932d704e74e
SHA25690f44f69950a796ab46ff09181585ac9dabf21271f16ebb9ea385c957e5955c1
SHA51272360ab4078ad5e0152324f9a856b3396e2d0247f7f95ac8a5a53a25126ac3cff567cc523849e28d92a99730ee8ffb30366f09c428258f93a5cca6d0c5905562
-
Filesize
56KB
MD5bd72dcf1083b6e22ccbfa0e8e27fb1e0
SHA13fd23d4f14da768da7b8364d74c54932d704e74e
SHA25690f44f69950a796ab46ff09181585ac9dabf21271f16ebb9ea385c957e5955c1
SHA51272360ab4078ad5e0152324f9a856b3396e2d0247f7f95ac8a5a53a25126ac3cff567cc523849e28d92a99730ee8ffb30366f09c428258f93a5cca6d0c5905562