Overview
overview
7Static
static
3Mad.Father...ig.exe
windows7-x64
1Mad.Father...ig.exe
windows10-2004-x64
1Mad.Father...me.exe
windows7-x64
1Mad.Father...me.exe
windows10-2004-x64
1Mad.Father...F4.dll
windows7-x64
3Mad.Father...F4.dll
windows10-2004-x64
3Mad.Father...ER.exe
windows7-x64
6Mad.Father...ER.exe
windows10-2004-x64
6Mad.Father...64.exe
windows7-x64
6Mad.Father...64.exe
windows10-2004-x64
6Mad.Father...mu.dll
windows7-x64
1Mad.Father...mu.dll
windows10-2004-x64
1Mad.Father...ll.dll
windows7-x64
3Mad.Father...ll.dll
windows10-2004-x64
3Mad.Father...64.dll
windows7-x64
1Mad.Father...64.dll
windows10-2004-x64
1Mad.Father...ay.dll
windows7-x64
1Mad.Father...ay.dll
windows10-2004-x64
1Mad.Father...ay.dll
windows7-x64
1Mad.Father...ay.dll
windows10-2004-x64
3Mad.Father...64.dll
windows7-x64
1Mad.Father...64.dll
windows10-2004-x64
1Mad.Father...pi.dll
windows7-x64
1Mad.Father...pi.dll
windows10-2004-x64
1Mad.Father...PC.url
windows7-x64
1Mad.Father...PC.url
windows10-2004-x64
1Mad.Father...up.exe
windows7-x64
7Mad.Father...up.exe
windows10-2004-x64
7Mad.Father...up.exe
windows7-x64
7Mad.Father...up.exe
windows10-2004-x64
7Mad.Father...st.exe
windows7-x64
7Mad.Father...st.exe
windows10-2004-x64
6Analysis
-
max time kernel
298s -
max time network
309s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/Config.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/Config.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/Game.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/Game.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/GuruguruSMF4.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/GuruguruSMF4.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/LAUNCHER.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/LAUNCHER.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/LAUNCHER_x64.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/LAUNCHER_x64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/SSEFirewall.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/SSEFirewall.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/SSEFirewall64.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/SSEFirewall64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/x64/SSEOverlay.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/x64/SSEOverlay.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/x86/SSEOverlay.dll
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu/Plugins/x86/SSEOverlay.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu64.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/SmartSteamEmu64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/steam_api.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/steam_api.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Mad.Father.v11.07.2020/STEAMUNLOCKED » Free Steam Games Pre-installed for PC.url
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Mad.Father.v11.07.2020/STEAMUNLOCKED » Free Steam Games Pre-installed for PC.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Mad.Father.v11.07.2020/_Redist/dotNetFx40_Full_setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Mad.Father.v11.07.2020/_Redist/dotNetFx40_Full_setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Mad.Father.v11.07.2020/_Redist/dxwebsetup.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Mad.Father.v11.07.2020/_Redist/dxwebsetup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Mad.Father.v11.07.2020/_Redist/oalinst.exe
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
Mad.Father.v11.07.2020/_Redist/oalinst.exe
Resource
win10v2004-20240508-en
General
-
Target
Mad.Father.v11.07.2020/Mad.Father.v11.07.2020/LAUNCHER_x64.exe
-
Size
266KB
-
MD5
e3ba1bc4f348eb8fda383c28b95d1e7f
-
SHA1
2192a4c48ee0b360c583dafe1a7c231e10397850
-
SHA256
14e3f10176b339febe4cb6bfbfa31a44818c5f56f028f831a9246e07ba9845d0
-
SHA512
61df06a3045294b0961dc198bb463f60cbbdf77dab563d881973ebfc3fd33958574cd99f8efb83deada3ecc822eb68ce0b0078b1257766db742c22d793fb984d
-
SSDEEP
3072:dX6L4KjZvon/3UPMOY4FnjqbGsB3LzHKH0Osi6soCeBVPoVJtCbhVPoVJtCbF:oLRjZveiFY/CslHKH0Osps0WehWe
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Game.exerundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 Game.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Game.exerundll32.exepid process 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2660 Game.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Game.exepid process 2660 Game.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Game.exepid process 2660 Game.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
LAUNCHER_x64.exeGame.exedescription pid process target process PID 2196 wrote to memory of 2660 2196 LAUNCHER_x64.exe Game.exe PID 2196 wrote to memory of 2660 2196 LAUNCHER_x64.exe Game.exe PID 2196 wrote to memory of 2660 2196 LAUNCHER_x64.exe Game.exe PID 2196 wrote to memory of 2660 2196 LAUNCHER_x64.exe Game.exe PID 2660 wrote to memory of 2736 2660 Game.exe rundll32.exe PID 2660 wrote to memory of 2736 2660 Game.exe rundll32.exe PID 2660 wrote to memory of 2736 2660 Game.exe rundll32.exe PID 2660 wrote to memory of 2736 2660 Game.exe rundll32.exe PID 2660 wrote to memory of 2736 2660 Game.exe rundll32.exe PID 2660 wrote to memory of 2736 2660 Game.exe rundll32.exe PID 2660 wrote to memory of 2736 2660 Game.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mad.Father.v11.07.2020\Mad.Father.v11.07.2020\LAUNCHER_x64.exe"C:\Users\Admin\AppData\Local\Temp\Mad.Father.v11.07.2020\Mad.Father.v11.07.2020\LAUNCHER_x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Mad.Father.v11.07.2020\Mad.Father.v11.07.2020\Game.exe"C:\Users\Admin\AppData\Local\Temp\Mad.Father.v11.07.2020\Mad.Father.v11.07.2020\Game.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Mad.Father.v11.07.2020\Mad.Father.v11.07.2020\SmartSteamEmu.dll",InitSSE3⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Mad.Father.v11.07.2020\Mad.Father.v11.07.2020\SmartSteamEmu\Plugins\SSEOverlay.ini
Filesize34B
MD5480005b54033d978380bff940142462d
SHA1e84e358f9c806852d2c3a54f98a85c35754c21e9
SHA256546bde00c0b7a1df06d6dc2d2e47c32a2bcc7df94b0025685b71e321acf07f0d
SHA512a517dcf5958ae24c2c1dcd89a7a5383673df68767932aba64348ad619b060eac12973054811534dc9963c89f553f2d366a212f35548b05503a936208f1badc61