Overview
overview
10Static
static
10SS Tool [E....3.exe
windows7-x64
5SS Tool [E....3.exe
windows10-2004-x64
5SS Tool [E...or.exe
windows7-x64
5SS Tool [E...or.exe
windows10-2004-x64
5SS Tool [E...ng.exe
windows7-x64
7SS Tool [E...ng.exe
windows10-2004-x64
7$PLUGINSDI...ng.exe
windows7-x64
3$PLUGINSDI...ng.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SS Tool [E...ui.jar
windows7-x64
1SS Tool [E...ui.jar
windows10-2004-x64
7SS Tool [E...er.exe
windows7-x64
7SS Tool [E...er.exe
windows10-2004-x64
7SS Tool [E...or.exe
windows7-x64
3SS Tool [E...or.exe
windows10-2004-x64
3SS Tool [E...ew.exe
windows7-x64
9SS Tool [E...ew.exe
windows10-2004-x64
9SS Tool [E...st.jar
windows7-x64
1SS Tool [E...st.jar
windows10-2004-x64
7SS Tool [E...ew.chm
windows7-x64
1SS Tool [E...ew.chm
windows10-2004-x64
1SS Tool [E...ew.exe
windows7-x64
4SS Tool [E...ew.exe
windows10-2004-x64
4SS Tool [E...ch.lnk
windows7-x64
3SS Tool [E...ch.lnk
windows10-2004-x64
3SS Tool [E...IN.lnk
windows7-x64
3SS Tool [E...IN.lnk
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 05:07
Behavioral task
behavioral1
Sample
SS Tool [Extract]/Applications/Bucky Roberts 3.3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SS Tool [Extract]/Applications/Bucky Roberts 3.3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
SS Tool [Extract]/Applications/CheatDetector.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
SS Tool [Extract]/Applications/CheatDetector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
SS Tool [Extract]/Applications/Everything.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
SS Tool [Extract]/Applications/Everything.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Everything/Everything.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Everything/Everything.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
SS Tool [Extract]/Applications/JDGui.jar
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
SS Tool [Extract]/Applications/JDGui.jar
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
SS Tool [Extract]/Applications/ProcessHacker.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
SS Tool [Extract]/Applications/ProcessHacker.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
SS Tool [Extract]/Applications/Schematica Reach Detector.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
SS Tool [Extract]/Applications/Schematica Reach Detector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
SS Tool [Extract]/Applications/USBDeview.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
SS Tool [Extract]/Applications/USBDeview.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
SS Tool [Extract]/Applications/Xray Pack Test.jar
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
SS Tool [Extract]/Applications/Xray Pack Test.jar
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.chm
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
SS Tool [Extract]/LastActivityViewer/LastActivityView.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
SS Tool [Extract]/Shortcuts/Prefetch.lnk
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
SS Tool [Extract]/Shortcuts/Prefetch.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
SS Tool [Extract]/Shortcuts/RECYCLE BIN.lnk
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
SS Tool [Extract]/Shortcuts/RECYCLE BIN.lnk
Resource
win10v2004-20240508-en
General
-
Target
SS Tool [Extract]/Applications/ProcessHacker.exe
-
Size
2.2MB
-
MD5
54daad58cce5003bee58b28a4f465f49
-
SHA1
162b08b0b11827cc024e6b2eed5887ec86339baa
-
SHA256
28042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063
-
SHA512
8330de722c8800ff64c6b9ea16a4ff7416915cd883e128650c47e5cb446dd3aaa2a9ba5c4ecda781d243be7fb437b054bbcf942ea714479e6cc3cef932390829
-
SSDEEP
49152:l9hfV/U5NkLXXzGZjt6kFTCVP6hWE0wvmk/eE+FrAl+NGsOSE6IX8pq:Dh9/ULkjKxtTGP6VZd2rAcvOSE6Nq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ProcessHacker.tmppid process 848 ProcessHacker.tmp -
Loads dropped DLL 3 IoCs
Processes:
ProcessHacker.exeProcessHacker.tmppid process 2380 ProcessHacker.exe 848 ProcessHacker.tmp 848 ProcessHacker.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ProcessHacker.exedescription pid process target process PID 2380 wrote to memory of 848 2380 ProcessHacker.exe ProcessHacker.tmp PID 2380 wrote to memory of 848 2380 ProcessHacker.exe ProcessHacker.tmp PID 2380 wrote to memory of 848 2380 ProcessHacker.exe ProcessHacker.tmp PID 2380 wrote to memory of 848 2380 ProcessHacker.exe ProcessHacker.tmp PID 2380 wrote to memory of 848 2380 ProcessHacker.exe ProcessHacker.tmp PID 2380 wrote to memory of 848 2380 ProcessHacker.exe ProcessHacker.tmp PID 2380 wrote to memory of 848 2380 ProcessHacker.exe ProcessHacker.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\SS Tool [Extract]\Applications\ProcessHacker.exe"C:\Users\Admin\AppData\Local\Temp\SS Tool [Extract]\Applications\ProcessHacker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\is-J3I5L.tmp\ProcessHacker.tmp"C:\Users\Admin\AppData\Local\Temp\is-J3I5L.tmp\ProcessHacker.tmp" /SL5="$4001C,1874675,150016,C:\Users\Admin\AppData\Local\Temp\SS Tool [Extract]\Applications\ProcessHacker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
785KB
MD51c96ed29e0136825e06f037bf10b2419
SHA1b74a55279474253639bebf9c92f10f947145ff30
SHA256b10cf8cdf541ca0dd6df79e66fb4b0854dcac717aba034ba0c4961bff92fd021
SHA5120e74854d9de4e3944b2cff9b5de7eb19fdec1fee6c9576cae6cd81741adf84eac421cb743b1df30183f645ffe849357b6a85b5be8d7f6e2efe289bbe4573e177