Overview
overview
3Static
static
1CuteVirusC...DME.md
windows10-1703-x64
3CuteVirusC...r.html
windows10-1703-x64
1CuteVirusC...evil.c
windows10-1703-x64
3CuteVirusC...last.c
windows10-1703-x64
3CuteVirusC...unch.c
windows10-1703-x64
3CuteVirusC...er.bat
windows10-1703-x64
1CuteVirusC...tes.md
windows10-1703-x64
3CuteVirusC...reen.c
windows10-1703-x64
3CuteVirusC...er.bat
windows10-1703-x64
1CuteVirusC...omb.sh
windows10-1703-x64
3CuteVirusC...h.html
windows10-1703-x64
1CuteVirusC...l.java
windows10-1703-x64
3CuteVirusC...er.vbs
windows10-1703-x64
1CuteVirusC...ayer.c
windows10-1703-x64
3CuteVirusC...e.html
windows10-1703-x64
1CuteVirusC...42.zip
windows10-1703-x64
1Analysis
-
max time kernel
599s -
max time network
487s -
platform
windows10-1703_x64 -
resource
win10-20231129-en -
resource tags
arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system -
submitted
12-12-2023 21:39
Static task
static1
Behavioral task
behavioral1
Sample
CuteVirusCollection-master/README.md
Resource
win10-20231129-en
Behavioral task
behavioral2
Sample
CuteVirusCollection-master/browser_breaker.html
Resource
win10-20231129-en
Behavioral task
behavioral3
Sample
CuteVirusCollection-master/chaos_devil.c
Resource
win10-20231129-en
Behavioral task
behavioral4
Sample
CuteVirusCollection-master/cmd_blast.c
Resource
win10-20231023-en
Behavioral task
behavioral5
Sample
CuteVirusCollection-master/consecutive_normal_punch.c
Resource
win10-20231025-en
Behavioral task
behavioral6
Sample
CuteVirusCollection-master/cpu_eater.bat
Resource
win10-20231020-en
Behavioral task
behavioral7
Sample
CuteVirusCollection-master/cute_quotes.md
Resource
win10-20231020-en
Behavioral task
behavioral8
Sample
CuteVirusCollection-master/dark_screen.c
Resource
win10-20231020-en
Behavioral task
behavioral9
Sample
CuteVirusCollection-master/folder_flooder.bat
Resource
win10-20231023-en
Behavioral task
behavioral10
Sample
CuteVirusCollection-master/fork_bomb.sh
Resource
win10-20231020-en
Behavioral task
behavioral11
Sample
CuteVirusCollection-master/memory_crash.html
Resource
win10-20231129-en
Behavioral task
behavioral12
Sample
CuteVirusCollection-master/out_of_control.java
Resource
win10-20231129-en
Behavioral task
behavioral13
Sample
CuteVirusCollection-master/prank_master.vbs
Resource
win10-20231129-en
Behavioral task
behavioral14
Sample
CuteVirusCollection-master/ram_slayer.c
Resource
win10-20231129-en
Behavioral task
behavioral15
Sample
CuteVirusCollection-master/unclosable.html
Resource
win10-20231129-en
Behavioral task
behavioral16
Sample
CuteVirusCollection-master/zip_bomb_42.zip
Resource
win10-20231023-en
General
-
Target
CuteVirusCollection-master/memory_crash.html
-
Size
253B
-
MD5
f8c66c21c95087cb1b8e0a2330014a33
-
SHA1
65fe9fc778b8797bd069aea0b75a70b0e6e3aa76
-
SHA256
cd56bd26a067e341040719897fdc60ab6a97c9690405d280f05658a34f613288
-
SHA512
9879fbfa681bf73b4c1c4e43ebb51e2e4d2d01c4558a20dddf176d9cc5c231566353903b3bf62ea9b7948ad6b8943e20f4c4ee0e17a05484ab27735bea1f7ec3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468909704956664" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 3700 chrome.exe 1948 chrome.exe 1948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4168 wrote to memory of 3700 4168 chrome.exe 74 PID 4168 wrote to memory of 3700 4168 chrome.exe 74 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4564 4168 chrome.exe 80 PID 4168 wrote to memory of 4188 4168 chrome.exe 79 PID 4168 wrote to memory of 4188 4168 chrome.exe 79 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78 PID 4168 wrote to memory of 2692 4168 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\CuteVirusCollection-master\memory_crash.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff4d159758,0x7fff4d159768,0x7fff4d1597782⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2836 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:12⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2828 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:22⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=940 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1748 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 --field-trial-handle=1780,i,159617547358423080,5471505286247985312,131072 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD568f27969af1aac3598a71b3e6c0bcc18
SHA1d29cf882380f40c4fd5cb9433b5c5a4634a7780d
SHA256118bd4e90c6a1b1e65f469e4b333e367fe017fdefdde73c1f5c14e957f498c31
SHA5120a1135066aa10c82fc9b9b678392bbbac24371c13a17e81914af9b69578eb327fdc30bb9431016de1fda807ed7233a116b49066d9a31824bf8da6ad21f92405b
-
Filesize
5KB
MD5e8aac71f98f510c6fe165383fcf7b878
SHA194005284247c77a8d34d24285ddd9a3f4a281e99
SHA256f07de147e427bb961fb6f86e93db98fdcd902f9b2297b1d2179a8c85839f3b81
SHA5126dcc67ac1bb6ee77ce98a97bff4976c4a7c4d114d3fa05ce475e1b3dc29fc26b70fcffa0a379de9a7a7345bdc7f5a71c1cd20984d5b62b5bc1cab271105b9381
-
Filesize
5KB
MD540867ab0c7620c00b44be27a289aea6c
SHA15cf179ee7f00ead38418e28b8a3c58e5af4220d0
SHA25678e5b85cff11c708ca15b24c8706580c604d0893f249ae8670730635ae65561e
SHA512ef9897663ab9544b03fc168186343d83c5ae01daf6a4b0853a63938036d12e6cce2542f6271b73114a903269a367806d1130cadf304789609d018428d5846fb3
-
Filesize
5KB
MD5c8d95ac44b915de0c7d72d9ba3442f8c
SHA16f19c09302f7fc1b344d78a8f8973af797651d42
SHA256e3a4dcc05e03458f11bb8265a9314d9192bee2d94135ed8f2c426a8d7d0bec1e
SHA512016a7992a2204dc7f9a507ca73f8af59c3cd7a389d9118ede2972b47445eb76b972c7bbbe7a805f61a157902a6359d85136dba633a984af76e9e092e43ce54a8
-
Filesize
3KB
MD5dd288d957fbb8a09047ee39510a866c6
SHA1795d673210cbe19ab122204f18101578e0962434
SHA2565f03e59e761be56b3e510103aefcffaed3a645fdee421e1c925dc1b8dd6e9c7e
SHA51231bbe435ed80568318297edb7fa24b9bfff6666716de397a4cac3127ceab8b00f73c4d6a4d152cd6eca85453b25fe18f99ba2dfc83d02b3bd88a47d21b3a5782
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd