Overview
overview
3Static
static
1GANG-Nuker...ANG.py
windows7-x64
3GANG-Nuker...ANG.py
windows10-2004-x64
3GANG-Nuker...ll.bat
windows7-x64
1GANG-Nuker...ll.bat
windows10-2004-x64
1GANG-Nuker...ker.py
windows7-x64
3GANG-Nuker...ker.py
windows10-2004-x64
3GANG-Nuker...gin.py
windows7-x64
3GANG-Nuker...gin.py
windows10-2004-x64
3GANG-Nuker...ter.py
windows7-x64
3GANG-Nuker...ter.py
windows10-2004-x64
3GANG-Nuker...ber.py
windows7-x64
3GANG-Nuker...ber.py
windows10-2004-x64
3GANG-Nuker...kup.py
windows7-x64
3GANG-Nuker...kup.py
windows10-2004-x64
3GANG-Nuker...nfo.py
windows7-x64
3GANG-Nuker...nfo.py
windows10-2004-x64
3GANG-Nuker...ore.py
windows7-x64
3GANG-Nuker...ore.py
windows10-2004-x64
3GANG-Nuker...mon.py
windows7-x64
3GANG-Nuker...mon.py
windows10-2004-x64
3GANG-Nuker...rys.py
windows7-x64
3GANG-Nuker...rys.py
windows10-2004-x64
3GANG-Nuker...ate.py
windows7-x64
3GANG-Nuker...ate.py
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
GANG-Nuker-main/GANG.py
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
GANG-Nuker-main/GANG.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
GANG-Nuker-main/install.bat
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
GANG-Nuker-main/install.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
GANG-Nuker-main/utilities/Plugins/Account_Nuker.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
GANG-Nuker-main/utilities/Plugins/Account_Nuker.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
GANG-Nuker-main/utilities/Plugins/Auto_Login.py
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
GANG-Nuker-main/utilities/Plugins/Auto_Login.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
GANG-Nuker-main/utilities/Plugins/DM_Deleter.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
GANG-Nuker-main/utilities/Plugins/DM_Deleter.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
GANG-Nuker-main/utilities/Plugins/QR_Grabber.py
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
GANG-Nuker-main/utilities/Plugins/QR_Grabber.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
GANG-Nuker-main/utilities/Plugins/Server_Lookup.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
GANG-Nuker-main/utilities/Plugins/Server_Lookup.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
GANG-Nuker-main/utilities/Plugins/Token_Info.py
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
GANG-Nuker-main/utilities/Plugins/Token_Info.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
GANG-Nuker-main/utilities/Plugins/ignore/ignore.py
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
GANG-Nuker-main/utilities/Plugins/ignore/ignore.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
GANG-Nuker-main/utilities/Settings/common.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
GANG-Nuker-main/utilities/Settings/common.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
GANG-Nuker-main/utilities/Settings/libarys.py
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
GANG-Nuker-main/utilities/Settings/libarys.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
GANG-Nuker-main/utilities/Settings/update.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
GANG-Nuker-main/utilities/Settings/update.py
Resource
win10v2004-20240508-en
General
-
Target
GANG-Nuker-main/utilities/Plugins/Account_Nuker.py
-
Size
4KB
-
MD5
358048187a18370ea97423b624d55eb0
-
SHA1
ceebc39463fb340e1706f61e556ac97bdd5d1955
-
SHA256
99cf576a407ec0795630692fc2752858c5fabc33ca66a70f70884f691a6c4cbe
-
SHA512
e6ff3f0cc4c63a60a30febe604f8da39279eaf4a46d04d238b7a4aaa8efc5e472f1848091ab7c5711db24cf77d90a309813269d4df138e569fbfc4b7b037d757
-
SSDEEP
96:o5dAI4DmDdZm3VQimkNHmnN4gXhTh+RUNRQCqgOM:6AI4D4dZGQinF61RQJc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file\shell\edit\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.py OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.py\ = "py_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\py_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\ᄛ豸㔀踀 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\ᄛ豸㔀踀\ = "py_auto_file" OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 OpenWith.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe 2524 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1944 2524 OpenWith.exe 95 PID 2524 wrote to memory of 1944 2524 OpenWith.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\GANG-Nuker-main\utilities\Plugins\Account_Nuker.py1⤵
- Modifies registry class
PID:1772
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\GANG-Nuker-main\utilities\Plugins\Account_Nuker.py2⤵PID:1944
-