Resubmissions

10/03/2024, 11:39

240310-nslb6acb9s 8

10/03/2024, 11:37

240310-nre4racb6z 3

10/03/2024, 11:33

240310-nn5j8sca91 3

Analysis

  • max time kernel
    1753s
  • max time network
    1167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 11:37

General

  • Target

    DDoS-Ripper-main/DRipper Free/DRipper.py

  • Size

    45KB

  • MD5

    580378acb814c7f7fc55d9d527d023d5

  • SHA1

    a17b00c9a90696ddce63c7159ed5e4144050be7a

  • SHA256

    33ed3cddc6718ddc6cd29395bcfd72ba381a4cc913ec1f49b4db505e19569a43

  • SHA512

    76c08899abfb619e7f8ca97886f6da9e89133626a5ae0882cfb1659f5f741bd36722f3e90cffdb0b32f3cf7e49ad98b729c80ab7657de95a2d0104f4d4a3e8d8

  • SSDEEP

    768:k5rvqAT05gmlPJoSQonpz+kNoZKaOUeqZtgej/Vt4EThIJILUZrlzuGiiYyYg+fN:Kr1I5RpzPobOUeqTtjVt4+hIJ4O5vRYF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\DDoS-Ripper-main\DRipper Free\DRipper.py"
    1⤵
    • Modifies registry class
    PID:4948
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1396
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:1604
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1204

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1204-0-0x000001DE6C740000-0x000001DE6C750000-memory.dmp

      Filesize

      64KB

    • memory/1204-16-0x000001DE6C840000-0x000001DE6C850000-memory.dmp

      Filesize

      64KB

    • memory/1204-32-0x000001DE74B30000-0x000001DE74B31000-memory.dmp

      Filesize

      4KB

    • memory/1204-34-0x000001DE74B60000-0x000001DE74B61000-memory.dmp

      Filesize

      4KB

    • memory/1204-35-0x000001DE74B60000-0x000001DE74B61000-memory.dmp

      Filesize

      4KB

    • memory/1204-36-0x000001DE74C70000-0x000001DE74C71000-memory.dmp

      Filesize

      4KB