Analysis

  • max time kernel
    784s
  • max time network
    1157s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-01-2024 16:10

General

  • Target

    selfbot/config.json

  • Size

    560B

  • MD5

    f50cd81113c1bfec829073237e1aa964

  • SHA1

    155fb38b596caec324bff4d19cb9d7f760b5291e

  • SHA256

    c780ef77c32653c6fdccc2db14afabb6fe2141c29a74d3d1d7eb7dce679c1bcd

  • SHA512

    9db63ca64617611ed3cb94b18f56ce88266a254b8745c47202e06e37bb19a80305c38edd6f1597082fa96a9fd5ad8b4818383d01e46d260cf93e284f7cabc1b2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\selfbot\config.json
    1⤵
    • Modifies registry class
    PID:3524
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
      "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\selfbot\config.json"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5076-0-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-1-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-3-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-5-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-4-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-2-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-7-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-6-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-9-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-10-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-8-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-12-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-11-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-13-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-14-0x00007FF9AB150000-0x00007FF9AB160000-memory.dmp

    Filesize

    64KB

  • memory/5076-15-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-16-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-18-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-17-0x00007FF9AB150000-0x00007FF9AB160000-memory.dmp

    Filesize

    64KB

  • memory/5076-19-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-20-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-21-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-22-0x00007FF9ECA70000-0x00007FF9ECB2D000-memory.dmp

    Filesize

    756KB

  • memory/5076-23-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-25-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-45-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-46-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-47-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-48-0x00007FF9ADCF0000-0x00007FF9ADD00000-memory.dmp

    Filesize

    64KB

  • memory/5076-49-0x00007FF9EDC60000-0x00007FF9EDE69000-memory.dmp

    Filesize

    2.0MB

  • memory/5076-50-0x00007FF9ECA70000-0x00007FF9ECB2D000-memory.dmp

    Filesize

    756KB