Overview
overview
3Static
static
3Nighty2.2.zip
windows7-x64
1Nighty2.2.zip
windows10-2004-x64
1selfbot/ce...rt.pem
windows7-x64
3selfbot/ce...rt.pem
windows10-2004-x64
3selfbot/config.json
windows7-x64
3selfbot/config.json
windows10-2004-x64
3selfbot/da...g.json
windows7-x64
3selfbot/da...g.json
windows10-2004-x64
3selfbot/da...ae.txt
windows7-x64
1selfbot/da...ae.txt
windows10-2004-x64
1selfbot/da...m.json
windows7-x64
3selfbot/da...m.json
windows10-2004-x64
3selfbot/da...p.json
windows7-x64
3selfbot/da...p.json
windows10-2004-x64
3selfbot/da...le.txt
windows7-x64
1selfbot/da...le.txt
windows10-2004-x64
1selfbot/da...t.json
windows7-x64
3selfbot/da...t.json
windows10-2004-x64
3selfbot/da...s.json
windows7-x64
3selfbot/da...s.json
windows10-2004-x64
3selfbot/da...r.json
windows7-x64
3selfbot/da...r.json
windows10-2004-x64
3selfbot/da...l.json
windows7-x64
3selfbot/da...l.json
windows10-2004-x64
3selfbot/da...ty.png
windows7-x64
3selfbot/da...ty.png
windows10-2004-x64
3selfbot/da...h.json
windows7-x64
3selfbot/da...h.json
windows10-2004-x64
3selfbot/da...e.json
windows7-x64
3selfbot/da...e.json
windows10-2004-x64
3selfbot/da...t.json
windows7-x64
3selfbot/da...t.json
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
Nighty2.2.zip
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Nighty2.2.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
selfbot/certifi/cacert.pem
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
selfbot/certifi/cacert.pem
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
selfbot/config.json
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
selfbot/config.json
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
selfbot/data/abuseconfig.json
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
selfbot/data/abuseconfig.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
selfbot/data/animated/dewae.txt
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
selfbot/data/animated/dewae.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
selfbot/data/automod/userspam.json
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
selfbot/data/automod/userspam.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
selfbot/data/backups/dailybackup.json
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
selfbot/data/backups/dailybackup.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
selfbot/data/customstatus/example.txt
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
selfbot/data/customstatus/example.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
selfbot/data/eventreact.json
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
selfbot/data/eventreact.json
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
selfbot/data/favorites.json
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
selfbot/data/favorites.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
selfbot/data/giveawayjoiner.json
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
selfbot/data/giveawayjoiner.json
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
selfbot/data/gmail.json
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
selfbot/data/gmail.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
selfbot/data/images/nighty.png
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
selfbot/data/images/nighty.png
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
selfbot/data/languages/english/english.json
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
selfbot/data/languages/english/english.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
selfbot/data/misc/about_me.json
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
selfbot/data/misc/about_me.json
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
selfbot/data/misc/auto_suggest.json
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
selfbot/data/misc/auto_suggest.json
Resource
win10v2004-20240508-en
General
-
Target
selfbot/certifi/cacert.pem
-
Size
282KB
-
MD5
9a9a33b00fac1d856e8cd176213295cf
-
SHA1
8970329101cb180dd6d3da0087c797505226366f
-
SHA256
1bc3a2bb4232e24544990e12d9298e0b2efc1887e7f99f5b26c325aec59d3ed7
-
SHA512
5f9d9d122c251dfc19698a4069c73042736ff6ea896dd311544af41b5c6994f7248d636f66b16b77861b3263cd3dc052cbe8ac99e20ae12c8a26054cb914d5c9
-
SSDEEP
6144:QW1H/M8f9R0mNplkXCRrwADwYCuMEigT/Q5MSRqNb7d84:QWN/vRLNLWCRrBC5MWavdV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pem rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pem_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pem_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pem_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pem_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pem\ = "pem_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pem_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pem_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2656 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 AcroRd32.exe 2656 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2420 2836 cmd.exe 29 PID 2836 wrote to memory of 2420 2836 cmd.exe 29 PID 2836 wrote to memory of 2420 2836 cmd.exe 29 PID 2420 wrote to memory of 2656 2420 rundll32.exe 30 PID 2420 wrote to memory of 2656 2420 rundll32.exe 30 PID 2420 wrote to memory of 2656 2420 rundll32.exe 30 PID 2420 wrote to memory of 2656 2420 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\selfbot\certifi\cacert.pem1⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\selfbot\certifi\cacert.pem2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\selfbot\certifi\cacert.pem"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ee88dc8f26fd34c5a6cd030a224f09cb
SHA1015fafea29f433efd0800cce7a33343fbc980d5d
SHA256772359f0ea8733575dbfc30eaa2b58fb2c1d618fa4f8f64fc3c82e3acf7058a0
SHA5125eb85364060298a23be76cc5e93000310174926888cebf1ed6ad0be913ad48b7b660197b0fc6de19a470f40de226faf4f2285b9193820bb82e170071c4f623b9