Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
Warrior's Skill Mixed By Deeyoung/Bot Wariors Cracker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Warrior's Skill Mixed By Deeyoung/Bot Wariors Cracker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Warrior's Skill Mixed By Deeyoung/DevComponents.DotNetBar1.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Warrior's Skill Mixed By Deeyoung/DevComponents.DotNetBar1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Warrior's Skill Mixed By Deeyoung/DevComponents.DotNetBar2.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
Warrior's Skill Mixed By Deeyoung/DevComponents.DotNetBar2.dll
Resource
win10v2004-20240508-en
General
-
Target
Warrior's Skill Mixed By Deeyoung/Bot Wariors Cracker.exe
-
Size
18KB
-
MD5
69284fcf3f28373188142e75a670cbef
-
SHA1
a4828ff8a9ce2b2b1a2875c54cacd05a80da6c11
-
SHA256
37c1f7dbb94b08110c3919be504570edc678121f14f5b24b917d6881214fc151
-
SHA512
62639f71999632ff8449206e1410a204751cc46c84fb4dfa8919b8d8ea43a0d34fe60ac11b0834287697168b51de70b8fe02197cfb648e00ff80e5916e96ea85
-
SSDEEP
384:jDcEz386Mxx1EYJKW9eupHCyTuyltk+4XXI+yWOD5B119izMeNFOJp:HcEj862pdUupHCquylm7XI8Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2608 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2804 2216 Bot Wariors Cracker.exe 28 PID 2216 wrote to memory of 2804 2216 Bot Wariors Cracker.exe 28 PID 2216 wrote to memory of 2804 2216 Bot Wariors Cracker.exe 28 PID 2216 wrote to memory of 2804 2216 Bot Wariors Cracker.exe 28 PID 2804 wrote to memory of 2608 2804 cmd.exe 30 PID 2804 wrote to memory of 2608 2804 cmd.exe 30 PID 2804 wrote to memory of 2608 2804 cmd.exe 30 PID 2804 wrote to memory of 2608 2804 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Warrior's Skill Mixed By Deeyoung\Bot Wariors Cracker.exe"C:\Users\Admin\AppData\Local\Temp\Warrior's Skill Mixed By Deeyoung\Bot Wariors Cracker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\WARRIO~1\BOTWAR~1.EXE2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:2608
-
-