Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3selfbot/Cr...20.dll
windows10-2004-x64
1selfbot/Cr...es.dll
windows10-2004-x64
1selfbot/Cr...ni.dll
windows10-2004-x64
1selfbot/Cr...bc.dll
windows10-2004-x64
1selfbot/Cr...fb.dll
windows10-2004-x64
1selfbot/Cr...tr.dll
windows10-2004-x64
1selfbot/Cr...cb.dll
windows10-2004-x64
1selfbot/Cr...sh.dll
windows10-2004-x64
1selfbot/Cr...cb.dll
windows10-2004-x64
1selfbot/Cr...fb.dll
windows10-2004-x64
1selfbot/Cr...2s.dll
windows10-2004-x64
1selfbot/Cr...D5.dll
windows10-2004-x64
1selfbot/Cr...A1.dll
windows10-2004-x64
1selfbot/Cr...56.dll
windows10-2004-x64
1selfbot/Cr...ul.dll
windows10-2004-x64
1selfbot/Cr...le.dll
windows10-2004-x64
1selfbot/Cr...pt.dll
windows10-2004-x64
1selfbot/Cr..._c.dll
windows10-2004-x64
1selfbot/Cr...or.dll
windows10-2004-x64
1selfbot/Nighty.exe
windows10-2004-x64
1selfbot/PI...ng.dll
windows10-2004-x64
1selfbot/PI...ft.dll
windows10-2004-x64
1selfbot/PIL/_webp.dll
windows10-2004-x64
1selfbot/_asyncio.dll
windows10-2004-x64
1selfbot/_bz2.dll
windows10-2004-x64
1selfbot/_c...nd.dll
windows10-2004-x64
1selfbot/_ctypes.dll
windows10-2004-x64
1selfbot/_decimal.dll
windows10-2004-x64
1selfbot/_e...ee.dll
windows10-2004-x64
1selfbot/_hashlib.dll
windows10-2004-x64
1selfbot/tc...ge.vbs
windows10-2004-x64
1selfbot/tcl/safe.ps1
windows10-2004-x64
1Analysis
-
max time kernel
1803s -
max time network
1139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
selfbot/Crypto/Cipher/_Salsa20.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
selfbot/Crypto/Cipher/_raw_aes.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
selfbot/Crypto/Cipher/_raw_aesni.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
selfbot/Crypto/Cipher/_raw_cbc.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
selfbot/Crypto/Cipher/_raw_cfb.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
selfbot/Crypto/Cipher/_raw_ctr.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
selfbot/Crypto/Cipher/_raw_ecb.dll
Resource
win10v2004-20231025-en
Behavioral task
behavioral8
Sample
selfbot/Crypto/Cipher/_raw_eksblowfish.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
selfbot/Crypto/Cipher/_raw_ocb.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
selfbot/Crypto/Cipher/_raw_ofb.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
selfbot/Crypto/Hash/_BLAKE2s.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
selfbot/Crypto/Hash/_MD5.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
selfbot/Crypto/Hash/_SHA1.dll
Resource
win10v2004-20231025-en
Behavioral task
behavioral14
Sample
selfbot/Crypto/Hash/_SHA256.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
selfbot/Crypto/Hash/_ghash_clmul.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral16
Sample
selfbot/Crypto/Hash/_ghash_portable.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
selfbot/Crypto/Protocol/_scrypt.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral18
Sample
selfbot/Crypto/Util/_cpuid_c.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
selfbot/Crypto/Util/_strxor.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral20
Sample
selfbot/Nighty.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
selfbot/PIL/_imaging.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral22
Sample
selfbot/PIL/_imagingft.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
selfbot/PIL/_webp.dll
Resource
win10v2004-20231025-en
Behavioral task
behavioral24
Sample
selfbot/_asyncio.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
selfbot/_bz2.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
selfbot/_cffi_backend.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
selfbot/_ctypes.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral28
Sample
selfbot/_decimal.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
selfbot/_elementtree.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral30
Sample
selfbot/_hashlib.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
selfbot/tcl/package.vbs
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
selfbot/tcl/safe.ps1
Resource
win10v2004-20231023-en
General
-
Target
selfbot/Nighty.exe
-
Size
230.0MB
-
MD5
95585d915a7767b16c690b33eb4fe1f9
-
SHA1
9984d94de6cc2a4eeb4afc22b3cd45e3ddabf937
-
SHA256
dbb67582de19994b747c5c6a50bbae0d859d740ae4f64558b9a192da7c7027b7
-
SHA512
a516c7450550fa4b528a9b2249dc8b9b01558cf546fd6751bb11672abe026dfe9f9be50f90225dae59ec0aaaa97cde62ff63ba27708aec45f0b0d54326966bbd
-
SSDEEP
786432:96mYuGhDob56tk+3mhWK3QZ9GYIJ81nFDJczJfcY:9PQmbud20BZFjFDIcY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_96DPI_PIXEL Nighty.exe Set value (int) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\python.exe = "11001" Nighty.exe Set value (int) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_96DPI_PIXEL\python.exe = "1" Nighty.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe 2712 Nighty.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2712 Nighty.exe Token: SeDebugPrivilege 2712 Nighty.exe Token: SeIncreaseQuotaPrivilege 1140 wmic.exe Token: SeSecurityPrivilege 1140 wmic.exe Token: SeTakeOwnershipPrivilege 1140 wmic.exe Token: SeLoadDriverPrivilege 1140 wmic.exe Token: SeSystemProfilePrivilege 1140 wmic.exe Token: SeSystemtimePrivilege 1140 wmic.exe Token: SeProfSingleProcessPrivilege 1140 wmic.exe Token: SeIncBasePriorityPrivilege 1140 wmic.exe Token: SeCreatePagefilePrivilege 1140 wmic.exe Token: SeBackupPrivilege 1140 wmic.exe Token: SeRestorePrivilege 1140 wmic.exe Token: SeShutdownPrivilege 1140 wmic.exe Token: SeDebugPrivilege 1140 wmic.exe Token: SeSystemEnvironmentPrivilege 1140 wmic.exe Token: SeRemoteShutdownPrivilege 1140 wmic.exe Token: SeUndockPrivilege 1140 wmic.exe Token: SeManageVolumePrivilege 1140 wmic.exe Token: 33 1140 wmic.exe Token: 34 1140 wmic.exe Token: 35 1140 wmic.exe Token: 36 1140 wmic.exe Token: SeIncreaseQuotaPrivilege 1140 wmic.exe Token: SeSecurityPrivilege 1140 wmic.exe Token: SeTakeOwnershipPrivilege 1140 wmic.exe Token: SeLoadDriverPrivilege 1140 wmic.exe Token: SeSystemProfilePrivilege 1140 wmic.exe Token: SeSystemtimePrivilege 1140 wmic.exe Token: SeProfSingleProcessPrivilege 1140 wmic.exe Token: SeIncBasePriorityPrivilege 1140 wmic.exe Token: SeCreatePagefilePrivilege 1140 wmic.exe Token: SeBackupPrivilege 1140 wmic.exe Token: SeRestorePrivilege 1140 wmic.exe Token: SeShutdownPrivilege 1140 wmic.exe Token: SeDebugPrivilege 1140 wmic.exe Token: SeSystemEnvironmentPrivilege 1140 wmic.exe Token: SeRemoteShutdownPrivilege 1140 wmic.exe Token: SeUndockPrivilege 1140 wmic.exe Token: SeManageVolumePrivilege 1140 wmic.exe Token: 33 1140 wmic.exe Token: 34 1140 wmic.exe Token: 35 1140 wmic.exe Token: 36 1140 wmic.exe Token: SeIncreaseQuotaPrivilege 4088 wmic.exe Token: SeSecurityPrivilege 4088 wmic.exe Token: SeTakeOwnershipPrivilege 4088 wmic.exe Token: SeLoadDriverPrivilege 4088 wmic.exe Token: SeSystemProfilePrivilege 4088 wmic.exe Token: SeSystemtimePrivilege 4088 wmic.exe Token: SeProfSingleProcessPrivilege 4088 wmic.exe Token: SeIncBasePriorityPrivilege 4088 wmic.exe Token: SeCreatePagefilePrivilege 4088 wmic.exe Token: SeBackupPrivilege 4088 wmic.exe Token: SeRestorePrivilege 4088 wmic.exe Token: SeShutdownPrivilege 4088 wmic.exe Token: SeDebugPrivilege 4088 wmic.exe Token: SeSystemEnvironmentPrivilege 4088 wmic.exe Token: SeRemoteShutdownPrivilege 4088 wmic.exe Token: SeUndockPrivilege 4088 wmic.exe Token: SeManageVolumePrivilege 4088 wmic.exe Token: 33 4088 wmic.exe Token: 34 4088 wmic.exe Token: 35 4088 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 Nighty.exe 2712 Nighty.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3812 2712 Nighty.exe 93 PID 2712 wrote to memory of 3812 2712 Nighty.exe 93 PID 2712 wrote to memory of 1140 2712 Nighty.exe 95 PID 2712 wrote to memory of 1140 2712 Nighty.exe 95 PID 2712 wrote to memory of 4088 2712 Nighty.exe 97 PID 2712 wrote to memory of 4088 2712 Nighty.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\selfbot\Nighty.exe"C:\Users\Admin\AppData\Local\Temp\selfbot\Nighty.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"2⤵PID:3812
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4088
-