Resubmissions
21-02-2024 22:28
240221-2d6lfagf69 1020-02-2024 02:07
240220-cjy14shc8z 1019-02-2024 17:57
240219-wjrftaaa5s 1001-02-2024 17:44
240201-wbb16addcj 10Analysis
-
max time kernel
154s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 02:07
General
-
Target
S500 CRASHED DESTROYED BY BIG DICK.zip
-
Size
82.3MB
-
MD5
5aa9ba2618a5e528af208ee5854cf2be
-
SHA1
3cf3eb1d8339bd5bc624ac10e797ccf556b538ca
-
SHA256
511a99c70f3a3aaad381b3bf626e411b3b41f7a7cf3e040068a8cdddc6224296
-
SHA512
f9d65db7b6ee067092ec08d4abeed3cbf40f2d7ada1a12ebe20d737aac9b1ed71895c9f9b7b1162a75733b25b14a022147cfd81970fcb9e7808eed3f9d79e087
-
SSDEEP
1572864:/JcbzDm3OZLuFkmVmzDmum6Whftzjat/Y34F1zBLgrNka51ML:Bcni3Gu/VmzWJ3KxYwANka51ML
Malware Config
Extracted
asyncrat
127.0.0.1:3232
nNx2ΔΙgg吉C伊弗Gp德WrDT
-
delay
3
-
install
false
-
install_folder
.
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/files/0x00060000000232ee-438.dat disable_win_def behavioral1/files/0x00060000000232ee-439.dat disable_win_def -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x00060000000232f4-467.dat family_asyncrat -
Executes dropped EXE 2 IoCs
Processes:
S500RAT.exesEXYbABY.exepid Process 2952 S500RAT.exe 4780 sEXYbABY.exe -
Drops file in Program Files directory 1 IoCs
Processes:
S500RAT.exedescription ioc Process File created C:\Program Files\Win64\crash_handeler.vbs S500RAT.exe -
Processes:
S500RAT.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\TypedURLs S500RAT.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
S500RAT.exepid Process 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe 2952 S500RAT.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
7zFM.exeS500RAT.exesEXYbABY.exedescription pid Process Token: SeRestorePrivilege 992 7zFM.exe Token: 35 992 7zFM.exe Token: SeSecurityPrivilege 992 7zFM.exe Token: SeDebugPrivilege 2952 S500RAT.exe Token: SeDebugPrivilege 4780 sEXYbABY.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
7zFM.exeS500RAT.exepid Process 992 7zFM.exe 992 7zFM.exe 2952 S500RAT.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
S500RAT.exepid Process 2952 S500RAT.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\S500 CRASHED DESTROYED BY BIG DICK.zip"1⤵PID:2912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1816
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\S500 CRASHED DESTROYED BY BIG DICK.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:992
-
C:\Users\Admin\Desktop\S500 CRASHED DESTROYED BY BIG DICK\S500RAT.exe"C:\Users\Admin\Desktop\S500 CRASHED DESTROYED BY BIG DICK\S500RAT.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2952
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2876
-
C:\Users\Admin\Desktop\S500 CRASHED DESTROYED BY BIG DICK\sEXYbABY.exe"C:\Users\Admin\Desktop\S500 CRASHED DESTROYED BY BIG DICK\sEXYbABY.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zE0E34E5C7\S500 CRASHED DESTROYED BY BIG DICK\Anarchy.Forms.FormRegValueEditMultiString.resources
Filesize67KB
MD5beda8bbd2a72e45431cf5dd68f7c6e61
SHA118e28ada040e4c62e33d946046a9ccf66f839f0d
SHA256f9f9c2a4855d61b7c7f93e9258d0306be802ef9c8c8929186deb71ee96b06d4c
SHA5126287bb138431c33a2dd30b7c06c979ee89f691900eb407e14465d58188d04d7697ecc68eb6d479db664ea86f35b7ce6b611834028ddbd56513003c1ca28f0899
-
C:\Users\Admin\AppData\Local\Temp\7zE0E34E5C7\S500 CRASHED DESTROYED BY BIG DICK\Anarchy.Forms.FormSendFileToMemory.resources
Filesize66KB
MD5fa80841e3dc9ffb31dd5d015c1030172
SHA1aa0d9e66db2a8528edf9931fe132f18870307216
SHA256a5b9f5ccfe8ac46a630ac1cc112d343364fa2bc4a2bec0f3911322cff174cff9
SHA512a38cc863d3c0c8d944340cd4116f03bbdb2f1526fb40b476cd0adbd444fd1dc10790d35eaf50ea34a1083b163baa82251a5048f075651bc14e46ac4cb82897bd
-
Filesize
1.9MB
MD54544872c197f9ad471bb18c648b004b0
SHA1280a1ec5ab002d1ab15279b3fb0de8dd3c4aa482
SHA256bf4aec4b6a094c21008b4788be9ca7072fcff0800cf1c098828222769b311e7b
SHA512aaf6a5a357976f6a83672009d3648f4dd7303bdd91eeca6b2d1ce35f59cb65563daa70505162f862bb7ce322d9645dbabd49e9a8f8a9e22d4d169f3d59ac8aca
-
Filesize
5.9MB
MD5dc1bd8b5f4f2b49fc7da72aca1ae33da
SHA10bf43f74e5a957178adb259aecf34cdeed24b8b1
SHA256d7a5a7ff25de9ce7709282b0ca714f942b29ea1b9ca222e9b2599f97676de9cd
SHA512d19a828bbd048f52a17f804d55faf8365fda0b2b4afdfb55cbe3e85093245325fd0affa31decd848d23fce9cfd7b92b2e0c9e2849aef2dda2b74fdaef4635b46
-
Filesize
9.5MB
MD5d26bd9b55d519ab05e621a4beba3b620
SHA106a4714f4663866d97ae6c2b7afe5eff666be6f5
SHA256b23de3cdea787b3dd5221d09b94cc7003903925c48128452937542f799d045b9
SHA51283ffc1c33d477de4b9f065721c8623ffa83a4438ed2ab2903205cc3abef9dc4047d35c0110e985785d2724eaa9b861f79b1da1837eaa1279a345ab3e32effc06
-
Filesize
11.8MB
MD5930c98b103a4ed3891f4a8729eae4e91
SHA181cbdb10fab4de7d26295d3e3ba14947ac9ead49
SHA256d282b73f251e49b299b4ba3b2af9460d02f2a9420f5b9023b2eb1fa00da02ae8
SHA5122301c9826b88c1b00b533fdbf185804c19c5d3180b9b0dcd44fa73c517e85aeb8b798805ade6376bcb492c7483252c52948e29313ff66b02358f93ae1b914501
-
Filesize
530B
MD5c7a4606f8f222fc96e1e6b08c093794b
SHA12700b3727ab01d93e75e1e12f308dcaeb1d37dba
SHA25632d656a69b19be98ae050512a4d0f49ebe21b6f7bb9c50130b7e952ea4f5239b
SHA5127516375b47536a51ede8079d25760e0142ac93077326b6cc033fd6cb1676b65aec7edb3f702922506f2b6b18992cd219be01e7adbf70c6d13404adceb410472b
-
Filesize
264KB
MD55a98d0d238e07f8e1ea530329fb08898
SHA1b7b16861671027ecd27aa4282e0356058453aa59
SHA2567908ad8f9e05645b6e7568df656c2aa4f67e8350a08aa8a1993ab67c325bb0db
SHA512c2c3761709acf86272e2f46ac604f274c2a6feb2f9e680b1783c521347441c9ba6e50c5086bea4aad9e2550edee962dd57b6907bc29c0ec427869d28d83a60f0
-
Filesize
1.3MB
MD5750c58af2e56b6addecffcf152520ab8
SHA114995e7f1d12498606d9d209d78d55fe6fd87802
SHA25627c56a28cbde094157206da1bfcd7a395111ab97b8a5ff600b11c2175dcefb26
SHA5122179790e23f61b3dfea828457f8609279c70b1e071cddc73b1dbda02caa664e0aae2553fc24a4956f9e89c477d66b1a704bde26fa23bc6db26c19e18db00abb5
-
Filesize
1KB
MD5e14c7402da26e4a1a1c226d546ec3aba
SHA13234c40fa2aec2d483d2b7ede9b901d3899d5336
SHA256dd00f7ce28d7ef1e14f50b046ca1736f15ab08e6458d2c2cc72d078e4354ddb7
SHA512cba4cd515319b11be1a94ffb22c4b14b933868217a1b7f6ce126568b82723769baf170f9d1f262135b8867162b8e932a9c2143603c4c9d668edc3f4622cfb5b2
-
Filesize
2.3MB
MD56d6e172e7965d1250a4a6f8a0513aa9f
SHA1b0fd4f64e837f48682874251c93258ee2cbcad2b
SHA256d1ddd15e9c727a5ecf78d3918c17aee0512f5b181ad44952686beb89146e6bd0
SHA51235daa38ad009599145aa241102bcd1f69b4caa55ebc5bb11df0a06567056c0ec5fcd02a33576c54c670755a6384e0229fd2f96622f12304dec58f79e1e834155
-
Filesize
63KB
MD59cabbaa5f95805449b6b39dfb5363ef7
SHA1bfc9f92dcb82de22f2cfafbc2004375a3de0e112
SHA2566ee41c8e942eadb4053b0b0e4535366e7a3921c740aa7d607bf3f3c9f8b20df9
SHA5129fcc2be5099620108668dd06e42c43565c7bc1e8b22e092b1dbd20fbb5145e70a24513010c089a13c1e4ed6575778c4a7ca18669b8a977109f63545a7b430471