Overview
overview
10Static
static
3000.exe
windows10-1703-x64
000.exe
windows10-2004-x64
Ana.exe
windows10-1703-x64
7Ana.exe
windows10-2004-x64
Bad Rabit.exe
windows10-1703-x64
10Bad Rabit.exe
windows10-2004-x64
10D34TH 2.0 .bat
windows10-1703-x64
8D34TH 2.0 .bat
windows10-2004-x64
8DDOS.bat
windows10-1703-x64
3DDOS.bat
windows10-2004-x64
7Desktop Puzzle.exe
windows10-1703-x64
1Desktop Puzzle.exe
windows10-2004-x64
1Memz.exe
windows10-1703-x64
7Memz.exe
windows10-2004-x64
7NoEscape.exe
windows10-1703-x64
NoEscape.exe
windows10-2004-x64
Phantom Crypter.bat
windows10-1703-x64
8Phantom Crypter.bat
windows10-2004-x64
8WannaCrypt0r.exe
windows10-1703-x64
10WannaCrypt0r.exe
windows10-2004-x64
10infinite locker.bat
windows10-1703-x64
7infinite locker.bat
windows10-2004-x64
7Analysis
-
max time kernel
91s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
000.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
000.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Ana.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Ana.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Bad Rabit.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Bad Rabit.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
D34TH 2.0 .bat
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
D34TH 2.0 .bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
DDOS.bat
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
DDOS.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
Desktop Puzzle.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
Desktop Puzzle.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Memz.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Memz.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
NoEscape.exe
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
NoEscape.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
Phantom Crypter.bat
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
Phantom Crypter.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
WannaCrypt0r.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
WannaCrypt0r.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
infinite locker.bat
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
infinite locker.bat
Resource
win10v2004-20240412-en
General
-
Target
infinite locker.bat
-
Size
1KB
-
MD5
ee64ffe8afb7ae50a94654b29b18e805
-
SHA1
845b1d1841eaebc4cf87f796ff272595b82b0a99
-
SHA256
0c2401442ccedb4cecb194044cd5c8893ae44ad84f549c4d9007a78153e26f40
-
SHA512
22bad3b85221af74cb931a6e358c6eb11ede54536c0bdf6a1f848589981a4608e4c2e41bf348fbbc3390026f206a6fcf899ea2877d19a402169e801bd3ec103b
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1220 takeown.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1220 takeown.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3332 wrote to memory of 1220 3332 cmd.exe 85 PID 3332 wrote to memory of 1220 3332 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\infinite locker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System322⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1220
-