Overview
overview
10Static
static
101680kb DMF...er.exe
windows7-x64
71680kb DMF...er.exe
windows10-2004-x64
7AntMem v13...64.vbs
windows7-x64
1AntMem v13...64.vbs
windows10-2004-x64
1Atlantis N...is.exe
windows7-x64
8Atlantis N...is.exe
windows10-2004-x64
7CSVboard v...rd.exe
windows7-x64
7CSVboard v...rd.exe
windows10-2004-x64
7Encopy5/encopy5.exe
windows7-x64
7Encopy5/encopy5.exe
windows10-2004-x64
7Eve/eve.exe
windows7-x64
8Eve/eve.exe
windows10-2004-x64
1FoldersRep...ep.exe
windows7-x64
9FoldersRep...ep.exe
windows10-2004-x64
9FoldersRep...t.html
windows7-x64
1FoldersRep...t.html
windows10-2004-x64
1MICROFTP/MicroFTP.exe
windows7-x64
7MICROFTP/MicroFTP.exe
windows10-2004-x64
7PDFproduce...er.exe
windows7-x64
7PDFproduce...er.exe
windows10-2004-x64
7Password G...pg.exe
windows7-x64
7Password G...pg.exe
windows10-2004-x64
7ShackUp/ShackUp.exe
windows7-x64
7ShackUp/ShackUp.exe
windows10-2004-x64
7Spread32/Spread32.exe
windows7-x64
7Spread32/Spread32.exe
windows10-2004-x64
7TheGun/THEGUN.exe
windows7-x64
1TheGun/THEGUN.exe
windows10-2004-x64
1Xcalday Ca...ay.exe
windows7-x64
7Xcalday Ca...ay.exe
windows10-2004-x64
7Xpass/xpass.dll
windows7-x64
7Xpass/xpass.dll
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 07:16
Behavioral task
behavioral1
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Atlantis Nova/Atlantis.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Atlantis Nova/Atlantis.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
CSVboard v1.1/CSVboard.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
CSVboard v1.1/CSVboard.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Encopy5/encopy5.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Encopy5/encopy5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Eve/eve.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Eve/eve.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
FoldersReport/folrep.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
FoldersReport/folrep.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
FoldersReport/report.html
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FoldersReport/report.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
MICROFTP/MicroFTP.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
MICROFTP/MicroFTP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
PDFproducer/PDFproducer.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
PDFproducer/PDFproducer.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Password Generator/pg.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Password Generator/pg.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
ShackUp/ShackUp.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ShackUp/ShackUp.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Spread32/Spread32.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Spread32/Spread32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
TheGun/THEGUN.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
TheGun/THEGUN.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Xcalday Calendar/xcalday.exe
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
Xcalday Calendar/xcalday.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Xpass/xpass.dll
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
Xpass/xpass.dll
Resource
win10v2004-20240508-en
General
-
Target
ShackUp/ShackUp.exe
-
Size
118KB
-
MD5
fa6aafe1b7ac72eb50a7b6902b35766e
-
SHA1
348b0f81793f5b1c1850d1af5df1a41f5bab6847
-
SHA256
68aad7f473df5d91619e02ccc142e3821865c88d047f3297677aa78b5466697e
-
SHA512
c49a6ed88f108ce6e147312bf7bdc85c9f97e828f5a9e56956502f4e1ea2f3edf4c70481bc735b87efd06e81b9971c0030e1f7c4eed0873c26f334cf132d26f0
-
SSDEEP
3072:kYxFFZRrVmx4+gLGiIiHWN9+H1f+9O8wGJWoutR:kY9Xr/g412A8jMoS
Malware Config
Signatures
-
resource yara_rule behavioral23/memory/2868-0-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral23/memory/2868-1-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral23/memory/2868-6-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral23/memory/2868-12-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Modifies registry class 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.shu\ShellNew\NullFile ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\print\command ShackUp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ShackUp\\ShackUp.exe /pt \"%1\" \"%2\" \"%3\" \"%4\"" ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\DefaultIcon ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\open ShackUp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ShackUp\\ShackUp.exe /p \"%1\"" ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\printto\command ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.shu\ShellNew ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document ShackUp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\ = "ShackUp Document" ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\printto ShackUp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.shu\ = "ShackUp.Document" ShackUp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ShackUp\\ShackUp.exe,1" ShackUp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ShackUp\\ShackUp.exe \"%1\"" ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\print ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.shu ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell\open\command ShackUp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShackUp.Document\shell ShackUp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 ShackUp.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2868 ShackUp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 ShackUp.exe 2868 ShackUp.exe