Overview
overview
8Static
static
7Illegal_Se...in.rar
windows10-2004-x64
3Illegal_Se...LA.rtf
windows10-2004-x64
1Illegal_Se...es.exe
windows10-2004-x64
8Illegal_Se...l.html
windows10-2004-x64
1Illegal_Se...za.dll
windows10-2004-x64
1Illegal_Se...za.exe
windows10-2004-x64
1Illegal_Se...xa.dll
windows10-2004-x64
1Illegal_Se...za.dll
windows10-2004-x64
3Illegal_Se...za.exe
windows10-2004-x64
1Illegal_Se...xa.dll
windows10-2004-x64
3Illegal_Se...ox.exe
windows10-2004-x64
3Illegal_Se...ox.exe
windows10-2004-x64
3Illegal_Se...-1.jpg
windows10-2004-x64
3Illegal_Se...10.jpg
windows10-2004-x64
3Illegal_Se...11.jpg
windows10-2004-x64
3Illegal_Se...12.jpg
windows10-2004-x64
3Illegal_Se...-2.jpg
windows10-2004-x64
3Illegal_Se...-3.jpg
windows10-2004-x64
3Illegal_Se...-4.jpg
windows10-2004-x64
3Illegal_Se...-5.jpg
windows10-2004-x64
3Illegal_Se...-6.jpg
windows10-2004-x64
3Illegal_Se...-7.jpg
windows10-2004-x64
3Illegal_Se...-8.ps1
windows10-2004-x64
1Illegal_Se...-9.jpg
windows10-2004-x64
3Illegal_Se...ad.exe
windows10-2004-x64
1Illegal_Se...ad.exe
windows10-2004-x64
1Illegal_Se...er.exe
windows10-2004-x64
7Illegal_Se...kg.exe
windows10-2004-x64
1Illegal_Se...iz.exe
windows10-2004-x64
1Illegal_Se...rl.exe
windows10-2004-x64
1Illegal_Se...N.lang
windows10-2004-x64
3Illegal_Se...R.lang
windows10-2004-x64
3Analysis
-
max time kernel
1200s -
max time network
1167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23-09-2023 13:15
Behavioral task
behavioral1
Sample
Illegal_Services-main.rar
Resource
win10v2004-20230915-es
Behavioral task
behavioral2
Sample
Illegal_Services-main/EULA.rtf
Resource
win10v2004-20230915-es
Behavioral task
behavioral3
Sample
Illegal_Services-main/Illegal_Services.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral4
Sample
Illegal_Services-main/Tutorial.html
Resource
win10v2004-20230915-es
Behavioral task
behavioral5
Sample
Illegal_Services-main/lib/7za/x64/7za.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral6
Sample
Illegal_Services-main/lib/7za/x64/7za.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral7
Sample
Illegal_Services-main/lib/7za/x64/7zxa.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral8
Sample
Illegal_Services-main/lib/7za/x86/7za.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral9
Sample
Illegal_Services-main/lib/7za/x86/7za.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral10
Sample
Illegal_Services-main/lib/7za/x86/7zxa.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral11
Sample
Illegal_Services-main/lib/OpenFileBox.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral12
Sample
Illegal_Services-main/lib/SaveFileBox.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral13
Sample
Illegal_Services-main/lib/backgrounds/background-1.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral14
Sample
Illegal_Services-main/lib/backgrounds/background-10.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral15
Sample
Illegal_Services-main/lib/backgrounds/background-11.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral16
Sample
Illegal_Services-main/lib/backgrounds/background-12.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral17
Sample
Illegal_Services-main/lib/backgrounds/background-2.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral18
Sample
Illegal_Services-main/lib/backgrounds/background-3.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral19
Sample
Illegal_Services-main/lib/backgrounds/background-4.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral20
Sample
Illegal_Services-main/lib/backgrounds/background-5.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral21
Sample
Illegal_Services-main/lib/backgrounds/background-6.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral22
Sample
Illegal_Services-main/lib/backgrounds/background-7.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral23
Sample
Illegal_Services-main/lib/backgrounds/background-8.ps1
Resource
win10v2004-20230915-es
Behavioral task
behavioral24
Sample
Illegal_Services-main/lib/backgrounds/background-9.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral25
Sample
Illegal_Services-main/lib/binread/x64/binread.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral26
Sample
Illegal_Services-main/lib/binread/x86/binread.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral27
Sample
Illegal_Services-main/lib/bookmarks_parser.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral28
Sample
Illegal_Services-main/lib/cmdbkg.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral29
Sample
Illegal_Services-main/lib/cmdwiz.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral30
Sample
Illegal_Services-main/lib/curl/x64/curl.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral31
Sample
Illegal_Services-main/lib/speak/EN.lang
Resource
win10v2004-20230915-es
Behavioral task
behavioral32
Sample
Illegal_Services-main/lib/speak/FR.lang
Resource
win10v2004-20230915-es
General
-
Target
Illegal_Services-main/lib/SaveFileBox.exe
-
Size
13KB
-
MD5
8108ff69b5760c8117563d6b10f77158
-
SHA1
f2f855408f671e1856f08d5f2b9bc74fa7e7bd0f
-
SHA256
48eb5c03141732b810570b557fe148e3f76764df3a632008972de44be88497e3
-
SHA512
63f1ab3095bf3a542bf980a43ea02948de9d1d44d975574aa7b6db20eb8e0fadd22c781a53c0e0603e81934bc3c96477c5330a2369728e5ea183f84712204ab9
-
SSDEEP
192:AnIIycajz2wF6HrwFNjOCuMN55ZBZD8KKYPWOztfMj8:4/yfz2wFv+K5Zf99S
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000002f574042100041646d696e003c0009000400efbe2f57293137578e6d2e000000d8e101000000010000000000000000000000000000002bfb3400410064006d0069006e00000014000000 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000002f57293112004170704461746100400009000400efbe2f57293137578e6d2e000000e3e101000000010000000000000000000000000000006c5b2f004100700070004400610074006100000016000000 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\0\MRUListEx = ffffffff SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = 740031000000000037578d6d1000494c4c4547417e3100005c0009000400efbe37578d6d37578e6d2e00000053320200000007000000000000000000000000000000e59b840049006c006c006500670061006c005f00530065007200760069006300650073002d006d00610069006e00000018000000 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 SaveFileBox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\0\NodeSlot = "1" SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 SaveFileBox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000002f5729311100557365727300640009000400efbe874f774837578e6d2e000000c70500000000010000000000000000003a00000000003f33470055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\0 SaveFileBox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\0 = 4a0031000000000037578d6d10006c696200380009000400efbe37578d6d37578e6d2e0000005b32020000000700000000000000000000000000000050be55006c0069006200000012000000 SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU SaveFileBox.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000002f57aa3310004c6f63616c003c0009000400efbe2f57293137578e6d2e000000f6e1010000000100000000000000000000000000000004100a014c006f00630061006c00000014000000 SaveFileBox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e0031000000000037578d6d100054656d7000003a0009000400efbe2f57293137578e6d2e000000f7e10100000001000000000000000000000000000000a2688700540065006d007000000014000000 SaveFileBox.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2040 SaveFileBox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2040 SaveFileBox.exe