Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 03:04

General

  • Target

    fallofwindows.exe

  • Size

    370KB

  • MD5

    7f13152a4e20b2fac49a0bea102b6122

  • SHA1

    5d46374164fcda53764237436f796a85a7f1b1d5

  • SHA256

    a12bde3cc7f15db10dad98fb07c2aed5134fb34c711736547603f574c528185f

  • SHA512

    5fcf2f4f90b3f6d7cccce53a477980383b8caf28c9a67fa3b1f553b0b5b5c187c001dfb126f4d65edeea92bfcf39a7297c8424c87472670386ed37fbeaad649a

  • SSDEEP

    6144:f+6zEHbvCEXlRk/O0zfHWaBsdWTE8oBN2FkSel3F7SWelTD9Tb+XG+Uypqn2TlY:DEHbvCEVR6BzfvB7oBNYel3F7JeldTbi

Score
10/10

Malware Config

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detects Kaiten/Tsunami Payload 4 IoCs
  • Detects Kaiten/Tsunami payload 4 IoCs
  • Kaiten/Tsunami

    Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fallofwindows.exe
    "C:\Users\Admin\AppData\Local\Temp\fallofwindows.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\6BDD.tmp\AIMING~1.BAT""
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Admin\AppData\Local\Temp\RSOD.exe
        RSOD.exe
        3⤵
        • Executes dropped EXE
        PID:2716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6BDD.tmp\AIMING~1.BAT
    Filesize

    1.6MB

    MD5

    f64530ab5a6f0abc0c7107e813158c1f

    SHA1

    4bf402bffad762db235ea9fb6f19d8af75cabd6c

    SHA256

    3421122c2d2b532f14f5f1881d03092ff2fc49adac44b72bbec69740a01f4748

    SHA512

    82721d327bd8024e11ec4b4557c4bb63bd38df06e6ef9b8007d0c83fdfa625bdcdedc6eede7ef8fa63d83cd0df624958210feb30a9a8acc9b98c82826555581a

  • C:\Users\Admin\AppData\Local\Temp\6BDD.tmp\AIMING~1.BAT
    Filesize

    1.6MB

    MD5

    f64530ab5a6f0abc0c7107e813158c1f

    SHA1

    4bf402bffad762db235ea9fb6f19d8af75cabd6c

    SHA256

    3421122c2d2b532f14f5f1881d03092ff2fc49adac44b72bbec69740a01f4748

    SHA512

    82721d327bd8024e11ec4b4557c4bb63bd38df06e6ef9b8007d0c83fdfa625bdcdedc6eede7ef8fa63d83cd0df624958210feb30a9a8acc9b98c82826555581a

  • C:\Users\Admin\AppData\Local\Temp\RSOD.exe
    Filesize

    11KB

    MD5

    2cd94e786a624bf706e3d74f86f1352c

    SHA1

    a199fa3dc341e5d8a508a6b87ebde2d7949ade86

    SHA256

    ebcecd72b8bb18ed52787b47bdaabbe4a9cee534b1498b7da8243fff39a685c9

    SHA512

    cb44edf11e6d253ecda97d85363acbb80da4ac552bc2ea4176765c81de872f5bb70a91082a7235551aacedddc9a4f361cbe1df87ee348199c1c7ab8593399b29

  • C:\Users\Admin\AppData\Local\Temp\RSOD.exe
    Filesize

    11KB

    MD5

    2cd94e786a624bf706e3d74f86f1352c

    SHA1

    a199fa3dc341e5d8a508a6b87ebde2d7949ade86

    SHA256

    ebcecd72b8bb18ed52787b47bdaabbe4a9cee534b1498b7da8243fff39a685c9

    SHA512

    cb44edf11e6d253ecda97d85363acbb80da4ac552bc2ea4176765c81de872f5bb70a91082a7235551aacedddc9a4f361cbe1df87ee348199c1c7ab8593399b29

  • \Users\Admin\AppData\Local\Temp\RSOD.exe
    Filesize

    11KB

    MD5

    2cd94e786a624bf706e3d74f86f1352c

    SHA1

    a199fa3dc341e5d8a508a6b87ebde2d7949ade86

    SHA256

    ebcecd72b8bb18ed52787b47bdaabbe4a9cee534b1498b7da8243fff39a685c9

    SHA512

    cb44edf11e6d253ecda97d85363acbb80da4ac552bc2ea4176765c81de872f5bb70a91082a7235551aacedddc9a4f361cbe1df87ee348199c1c7ab8593399b29

  • memory/2448-32-0x0000000000400000-0x00000000005B3000-memory.dmp
    Filesize

    1.7MB

  • memory/2448-0-0x0000000000400000-0x00000000005B3000-memory.dmp
    Filesize

    1.7MB

  • memory/2668-31-0x00000000021F0000-0x00000000021F1000-memory.dmp
    Filesize

    4KB

  • memory/2668-69-0x00000000021F0000-0x00000000021F1000-memory.dmp
    Filesize

    4KB

  • memory/2716-25-0x0000000000920000-0x000000000092A000-memory.dmp
    Filesize

    40KB

  • memory/2716-30-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp
    Filesize

    9.9MB

  • memory/2716-34-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp
    Filesize

    9.9MB

  • memory/2716-94-0x000000001B4A0000-0x000000001B520000-memory.dmp
    Filesize

    512KB

  • memory/2716-124-0x000000001B4A0000-0x000000001B520000-memory.dmp
    Filesize

    512KB