Analysis
-
max time kernel
590s -
max time network
405s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2024 22:53
Behavioral task
behavioral1
Sample
Email-Worms.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Gruel.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Happy99.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
MeltingScreen.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
MsWorld.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
MyDoom.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
NetSky.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
Parrot.exe
Resource
win10-20240404-en
General
-
Target
Parrot.exe
-
Size
51KB
-
MD5
73d35451dbfbba5ac051d36f095a629f
-
SHA1
0a1c087e6f91506f96e284b89d99a283d650de07
-
SHA256
af983d2bf8f90fe563159983521b110e8560a409391254cb8ba7662df88fa3c3
-
SHA512
9d74bb098aafa7cf3a9dee0f9a0638015d4be8ea26631082db810560748d2da85607d3bc67c9d75cfa2642e93dca3e0b0c6d214b38176a3b6ac2ba44cbe27836
-
SSDEEP
768:oN2SaAr2oCgNHt9WoxayWIHZuvxulndbdb+UWEkrRNK+rR8NeJf9XR6idH6A3s:oASnrpNHt9bUYoWdbdb+VEkr+WXdHvc
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Parrot.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "msg.vbs" Parrot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "hello.mp3" Parrot.exe -
Drops file in System32 directory 1 IoCs
Processes:
Parrot.exedescription ioc process File created C:\Windows\SysWOW64\regedit.exe Parrot.exe -
Drops file in Windows directory 24 IoCs
Processes:
Parrot.exedescription ioc process File created C:\Windows\explorer.exe Parrot.exe File created C:\Windows\HelpPane.exe Parrot.exe File created C:\Windows\splwow64.prt Parrot.exe File created C:\Windows\sysmon.prt Parrot.exe File created C:\Windows\parrot.mp3 Parrot.exe File created C:\Windows\hello.mp3 Parrot.exe File created C:\Windows\explorer.prt Parrot.exe File created C:\Windows\hh.exe Parrot.exe File created C:\Windows\regedit.prt Parrot.exe File created C:\Windows\winhlp32.prt Parrot.exe File created C:\Windows\bfsvc.prt Parrot.exe File created C:\Windows\hh.prt Parrot.exe File created C:\Windows\notepad.prt Parrot.exe File created C:\Windows\splwow64.exe Parrot.exe File created C:\Windows\write.prt Parrot.exe File created C:\Windows\winstart.bat Parrot.exe File created C:\Windows\HelpPane.prt Parrot.exe File created C:\Windows\bfsvc.exe Parrot.exe File created C:\Windows\notepad.exe Parrot.exe File created C:\Windows\sysmon.exe Parrot.exe File created C:\Windows\winhlp32.exe Parrot.exe File created C:\Windows\write.exe Parrot.exe File created C:\Windows\msg.vbs Parrot.exe File created C:\Windows\parrot.scr Parrot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
Parrot.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings Parrot.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 700 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 700 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEvlc.exedescription pid process Token: 33 1296 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1296 AUDIODG.EXE Token: 33 700 vlc.exe Token: SeIncBasePriorityPrivilege 700 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
vlc.exepid process 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe 700 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 700 vlc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Parrot.exedescription pid process target process PID 2280 wrote to memory of 4588 2280 Parrot.exe WScript.exe PID 2280 wrote to memory of 4588 2280 Parrot.exe WScript.exe PID 2280 wrote to memory of 4588 2280 Parrot.exe WScript.exe PID 2280 wrote to memory of 700 2280 Parrot.exe vlc.exe PID 2280 wrote to memory of 700 2280 Parrot.exe vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Parrot.exe"C:\Users\Admin\AppData\Local\Temp\Parrot.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\mail.vbs"2⤵
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Windows\parrot.mp3"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2541⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\parrot.mp3Filesize
8KB
MD5ab4ee6036a4bd4db7808838411c44ac9
SHA17fcad4012fe4976e0d14828a58814acfa33136f5
SHA256b5f09e2de74cbcc29b92612ded3ed2e24fdf5c6704d3ccb888a663dcb8c75da4
SHA512b1ddcf096161e67ccdad111a1d2cae34b955abf6aa8cae9c4bc9c0fc65491a5b6f6537b16fca28e8034f1db3cc55ddccb963c51c9133f3b79d5d2baa06043354
-
C:\mail.vbsFilesize
671B
MD50fb2174f62406bf056bb79fc7a11d855
SHA1356e41229d24c51f6ee723d2db936e13db770508
SHA2562e4986c2fa63e89e96492fdf7aaed9f82edf54039ee9d6f073e39f1290da4e8e
SHA512b939ee5ea959212d2b777868a5bb843981e9873885bf4eb2900c0fc638bcd3d6e24fbe495ec68839512578e9246f89052f17e1d2a101a1b5e737b63f565bf6fa
-
memory/700-44-0x00007FFBE5750000-0x00007FFBE595B000-memory.dmpFilesize
2.0MB
-
memory/700-88-0x00007FFBE46A0000-0x00007FFBE5750000-memory.dmpFilesize
16.7MB
-
memory/700-40-0x00007FFBF7C90000-0x00007FFBF7CA7000-memory.dmpFilesize
92KB
-
memory/700-34-0x00007FF725420000-0x00007FF725518000-memory.dmpFilesize
992KB
-
memory/700-41-0x00007FFBF56B0000-0x00007FFBF56C1000-memory.dmpFilesize
68KB
-
memory/700-43-0x00007FFBF55C0000-0x00007FFBF55D1000-memory.dmpFilesize
68KB
-
memory/700-42-0x00007FFBF55E0000-0x00007FFBF55FD000-memory.dmpFilesize
116KB
-
memory/700-46-0x00007FFBF5400000-0x00007FFBF5421000-memory.dmpFilesize
132KB
-
memory/700-47-0x00007FFBF55A0000-0x00007FFBF55B8000-memory.dmpFilesize
96KB
-
memory/700-39-0x00007FFBF7CB0000-0x00007FFBF7CC1000-memory.dmpFilesize
68KB
-
memory/700-35-0x00007FFBF7E30000-0x00007FFBF7E64000-memory.dmpFilesize
208KB
-
memory/700-48-0x00007FFBE46A0000-0x00007FFBE5750000-memory.dmpFilesize
16.7MB
-
memory/700-45-0x00007FFBF5430000-0x00007FFBF5471000-memory.dmpFilesize
260KB
-
memory/700-36-0x00007FFBF4400000-0x00007FFBF46B6000-memory.dmpFilesize
2.7MB
-
memory/700-38-0x00007FFBF7E10000-0x00007FFBF7E27000-memory.dmpFilesize
92KB
-
memory/700-37-0x00007FFBF8460000-0x00007FFBF8478000-memory.dmpFilesize
96KB
-
memory/700-53-0x00007FFBF2D20000-0x00007FFBF2D32000-memory.dmpFilesize
72KB
-
memory/700-52-0x00007FFBF52A0000-0x00007FFBF52BB000-memory.dmpFilesize
108KB
-
memory/700-51-0x00007FFBF53A0000-0x00007FFBF53B1000-memory.dmpFilesize
68KB
-
memory/700-50-0x00007FFBF53C0000-0x00007FFBF53D1000-memory.dmpFilesize
68KB
-
memory/700-49-0x00007FFBF53E0000-0x00007FFBF53F1000-memory.dmpFilesize
68KB
-
memory/2280-25-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/2280-0-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB