Overview
overview
10Static
static
10PrankPack-...MD.exe
windows7-x64
7PrankPack-...rp.exe
windows7-x64
1PrankPack-...or.exe
windows7-x64
1PrankPack-...ns.exe
windows7-x64
1PrankPack-...se.exe
windows7-x64
1PrankPack-...od.hta
windows7-x64
1PrankPack-...ot.hta
windows7-x64
10PrankPack-...el.exe
windows7-x64
1PrankPack-...ff.exe
windows7-x64
7PrankPack-...ra.exe
windows7-x64
1PrankPack-... 1.vbs
windows7-x64
1PrankPack-... 2.vbs
windows7-x64
1PrankPack-...OD.exe
windows7-x64
1PrankPack-...ge.vbs
windows7-x64
1PrankPack-...in.exe
windows7-x64
7PrankPack-...nd.exe
windows7-x64
1PrankPack-...nd.exe
windows7-x64
1PrankPack-...nd.exe
windows7-x64
1PrankPack-...in.exe
windows7-x64
1PrankPack-...er.exe
windows7-x64
1PrankPack-...op.exe
windows7-x64
1PrankPack-...nd.exe
windows7-x64
1PrankPack-...ay.exe
windows7-x64
1PrankPack-...er.exe
windows7-x64
7PrankPack-...er.exe
windows7-x64
1PrankPack-...S).exe
windows7-x64
7PrankPack-...D).exe
windows7-x64
7PrankPack-...er.exe
windows7-x64
7PrankPack-...ay.exe
windows7-x64
1PrankPack-... 1.exe
windows7-x64
10PrankPack-... 2.exe
windows7-x64
10Analysis
-
max time kernel
1558s -
max time network
1594s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 17:32
Behavioral task
behavioral1
Sample
PrankPack-main/Pack/Prank Pack/Fun/Bomber CMD.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PrankPack-main/Pack/Prank Pack/Fun/Burp.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
PrankPack-main/Pack/Prank Pack/Fun/Error Icons Cursor.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
PrankPack-main/Pack/Prank Pack/Fun/Error Icons.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
PrankPack-main/Pack/Prank Pack/Fun/Inverse.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
PrankPack-main/Pack/Prank Pack/Fun/bsod.hta
Resource
win7-20240215-en
Behavioral task
behavioral7
Sample
PrankPack-main/Pack/Prank Pack/Fun/hotspot.hta
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PrankPack-main/Pack/Prank Pack/Fun/toonel.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
PrankPack-main/Pack/Prank Pack/Jerking Off.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
PrankPack-main/Pack/Prank Pack/Messages/Hydra.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
PrankPack-main/Pack/Prank Pack/Messages/Message 1.vbs
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
PrankPack-main/Pack/Prank Pack/Messages/Message 2.vbs
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
PrankPack-main/Pack/Prank Pack/Messages/myBSOD.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
PrankPack-main/Pack/Prank Pack/Messages/system32 delete message.vbs
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
PrankPack-main/Pack/Prank Pack/Overlay 800x800 Penis Spin.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
PrankPack-main/Pack/Prank Pack/Overlay FULL HD Man with Sound.exe
Resource
win7-20240215-en
Behavioral task
behavioral17
Sample
PrankPack-main/Pack/Prank Pack/Overlay FULL HD Naked Man with Sound.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
PrankPack-main/Pack/Prank Pack/Overlay FULL HD Penis Spin with Sound.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
PrankPack-main/Pack/Prank Pack/Overlay FULL HD Penis Spin.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
PrankPack-main/Pack/Prank Pack/Overlay Full HD Hitler.exe
Resource
win7-20240220-en
Behavioral task
behavioral21
Sample
PrankPack-main/Pack/Prank Pack/Overlay Full HD Poop.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
PrankPack-main/Pack/Prank Pack/Overlay Full HD with Sound.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
PrankPack-main/Pack/Prank Pack/Overlay.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
PrankPack-main/Pack/Prank Pack/Penis Cursor Changer.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
PrankPack-main/Pack/Prank Pack/Screamer.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
PrankPack-main/Pack/Prank Pack/Screen Breaker (DANGEROUS).exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
PrankPack-main/Pack/Prank Pack/Sound 10 (EXTREMELY LOUD).exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
PrankPack-main/Pack/Prank Pack/Swastika Cursor Changer.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
PrankPack-main/Pack/Prank Pack/Vote Overlay.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
PrankPack-main/Pack/Prank Pack/Winlocker Builder/WinLocker Builder 1.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
PrankPack-main/Pack/Prank Pack/Winlocker Builder/WinLocker Builder 2.exe
Resource
win7-20240221-en
General
-
Target
PrankPack-main/Pack/Prank Pack/Overlay 800x800 Penis Spin.exe
-
Size
7.5MB
-
MD5
118598960643743b3d289c119b8ee85d
-
SHA1
7b4ebac6841181b56c973b8488bf843874123f4a
-
SHA256
09937485f36f0d39599ca57d947373ef2484eb16bea9b39d595b3795d3b02636
-
SHA512
2a3f21b747f7a12209581606ffd54f6140bfba2e5b887bdb86c4b0189c81e6463e5c040c60f60f12b6f27bd1edf38782d62f809600cfcb00ed5bb08c816cab30
-
SSDEEP
196608:SXI/6YcFfBrebd0olJ7rGxUuMu6vzxDJlp6:SY/FyfBA7lsKNtvdPp6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
meat.exepid process 1860 meat.exe -
Loads dropped DLL 3 IoCs
Processes:
meat.exepid process 1860 meat.exe 1860 meat.exe 1860 meat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
meat.exepid process 1860 meat.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
meat.exepid process 1860 meat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
meat.exepid process 1860 meat.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Overlay 800x800 Penis Spin.execmd.exedescription pid process target process PID 2152 wrote to memory of 2192 2152 Overlay 800x800 Penis Spin.exe cmd.exe PID 2152 wrote to memory of 2192 2152 Overlay 800x800 Penis Spin.exe cmd.exe PID 2152 wrote to memory of 2192 2152 Overlay 800x800 Penis Spin.exe cmd.exe PID 2152 wrote to memory of 2192 2152 Overlay 800x800 Penis Spin.exe cmd.exe PID 2192 wrote to memory of 1860 2192 cmd.exe meat.exe PID 2192 wrote to memory of 1860 2192 cmd.exe meat.exe PID 2192 wrote to memory of 1860 2192 cmd.exe meat.exe PID 2192 wrote to memory of 1860 2192 cmd.exe meat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PrankPack-main\Pack\Prank Pack\Overlay 800x800 Penis Spin.exe"C:\Users\Admin\AppData\Local\Temp\PrankPack-main\Pack\Prank Pack\Overlay 800x800 Penis Spin.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\169C.tmp\169D.tmp\169E.bat "C:\Users\Admin\AppData\Local\Temp\PrankPack-main\Pack\Prank Pack\Overlay 800x800 Penis Spin.exe""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\meat.exemeat.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\169C.tmp\169D.tmp\169E.batFilesize
30B
MD52abbb5426746949244681ee4d9e0b9ab
SHA151ade840ffba5192afe09ded6eb030521d322946
SHA256fa870338abcbe4f77196cf25b0e68832932a0ba67e6a14396ba14203ec2406c4
SHA512e35c8e2b965ad0a42a6f4a2295b7a110f54f77c643dc120c2412ad1fcd8325917eaa1d689749a703b5245e77d62959cd1b5eee6b5ac2b14a803f5729c86273b7
-
C:\Users\Admin\AppData\Roaming\meat.exeFilesize
3.2MB
MD501887e51d2d9c85d36e14372aeb03be3
SHA17602d0346670d8532f57dcd525bfac5f2b1cdb32
SHA256fae0e04c8d36bffc861e39f04e2779344d967ef9a8067b34c6fe7ac2a29d4518
SHA5129d8c7a56091c5b1334e2c8736dc22a527e1003f257e6bc7f2dc44403dc5b4d19977069d0b8a3a78d6f1e9c5983de8cc7d8b22ba5bf2f29bd42456edf4f6bf83f
-
C:\Users\Admin\AppData\Roaming\meat.exeFilesize
3.0MB
MD5965617c38c25463166418df0a3f91e82
SHA1b39df7610fb59c98f6b610336ea2ba330a1661f4
SHA2560dd69126f723b508f4d482f1dd9a0294474792bcfe0cf9a35211e928d7881f90
SHA51239e57a546932aacedcb3cb819aef86cde00d2603b3a5c4a9e4b331b36168a1cb3c497063d7b831c784b513797025fbc219725b75b1065cc43865c31cadb8b5fd
-
\Users\Admin\AppData\Local\Temp\mrt17F4.tmp\mmf2d3d9.dllFilesize
1.1MB
MD522284d6bb382967ff72363f828050e13
SHA15c98e25d24aacafffded9353c9526be0128c6dbd
SHA2569eaa342059785bd584df956574c637e6d0e6016a099221a56e0397f8c86cd93f
SHA5122e5a5bf115b1d2a07d0647b6f4925ab84301ca6354e3f3beb8d44f51900ff21b06b97b23128160fd94dfd33116d03094ca47c49143ae98473eaaed441f9705b2
-
\Users\Admin\AppData\Local\Temp\mrt17F4.tmp\mmfs2.dllFilesize
459KB
MD54cf7bb74d8104280b7e986f4df21109d
SHA1edc21a43136afddbf4786593e84b934d40591b74
SHA256c0d56cefb509e5600ac6b430adcaf53b81881d3fff4e62b7ede158d66d826622
SHA5122bbac48354657659795697e67508d777ee595348e1fb3d4b6c65d8618c346b3be0052b1e2e2fe669dcca19c3c00d59d1833acc21d88a97efbde2694935e3c292
-
\Users\Admin\AppData\Local\Temp\mrt17F4.tmp\mp3flt.sftFilesize
24KB
MD57beafd3ec0c36a1422387c43c49f68ff
SHA1240e7d8534ed25dffb902a969826f4300a88dde6
SHA256cd5bd7cc59eaf42bc0edf418ce6f077f9db369d5e3c414107b82492a877a6176
SHA51244101803bd757bb7a84577aa1c087472a619da732dcdb3947b683cd7a7df30931e4c9973e06532859f9654c4ad3635db205e41fc7214a0f52537be91e87b2734
-
memory/1860-25-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-22-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-20-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-28-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-27-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-26-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-17-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-24-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-23-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-19-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-21-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-32-0x0000000074D70000-0x0000000074DE8000-memory.dmpFilesize
480KB
-
memory/1860-35-0x0000000074D70000-0x0000000074DE8000-memory.dmpFilesize
480KB
-
memory/1860-34-0x0000000074D70000-0x0000000074DE8000-memory.dmpFilesize
480KB
-
memory/1860-18-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB
-
memory/1860-33-0x0000000074D70000-0x0000000074DE8000-memory.dmpFilesize
480KB
-
memory/1860-31-0x0000000074D70000-0x0000000074DE8000-memory.dmpFilesize
480KB
-
memory/1860-30-0x0000000074D70000-0x0000000074DE8000-memory.dmpFilesize
480KB
-
memory/1860-16-0x0000000000840000-0x0000000000945000-memory.dmpFilesize
1.0MB