Overview
overview
3Static
static
1Mehlwand.zip
windows10-2004-x64
1-Discord.sk
windows10-2004-x64
3-Tab.sk
windows10-2004-x64
3AMS.sk
windows10-2004-x64
3API.sk
windows10-2004-x64
3Anti.sk
windows10-2004-x64
3AntiCheat.sk
windows10-2004-x64
3Ban.sk
windows10-2004-x64
3BitcoinClicker.sk
windows10-2004-x64
3Buy.sk
windows10-2004-x64
3CustomRecipies.sk
windows10-2004-x64
3Enderchest.sk
windows10-2004-x64
3Event.sk
windows10-2004-x64
3ItemDB.sk
windows10-2004-x64
3Join.sk
windows10-2004-x64
3Lunar.sk
windows10-2004-x64
3Mine.sk
windows10-2004-x64
3NPC.sk
windows10-2004-x64
3Perks.sk
windows10-2004-x64
3Playtime.sk
windows10-2004-x64
3Ranginfo.sk
windows10-2004-x64
3Ranking.sk
windows10-2004-x64
3Scoreboard.sk
windows10-2004-x64
3Secret.sk
windows10-2004-x64
3System.sk
windows10-2004-x64
3_INVFIX BI...EN_.sk
windows10-2004-x64
3ddos.sk
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
Mehlwand.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
-Discord.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
-Tab.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
AMS.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
API.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
Anti.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
AntiCheat.sk
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Ban.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
BitcoinClicker.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral10
Sample
Buy.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
CustomRecipies.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral12
Sample
Enderchest.sk
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Event.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral14
Sample
ItemDB.sk
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Join.sk
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
Lunar.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
Mine.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral18
Sample
NPC.sk
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Perks.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
Playtime.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
Ranginfo.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral22
Sample
Ranking.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
Scoreboard.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
Secret.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
System.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
_INVFIX BITTE BERALL EINBAUEN_.sk
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
ddos.sk
Resource
win10v2004-20240704-en
General
-
Target
Mehlwand.zip
-
Size
29KB
-
MD5
0e9f6c7c6f2c83535fb10ce7e7551416
-
SHA1
e8ce9fb87c2fb768aba01b6576d88547c1ca3142
-
SHA256
21babac91b607031d6e0d7642918bcdc5b62d1ab409838b62adc63c00ceece88
-
SHA512
c120e263d884e7fb0b90cc2e5a3ebe6a24c14bcdcd9a75483d5f96d6186cb4a33f0a8b22195e756afc35337a809f9b3f706c9aa2977e6924b838266fa17341e2
-
SSDEEP
768:3WsOok8sWymeKJZT8oRhiH/x/D+82/mGsdJY9v:kVMhiH/x/D+8C39
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeCreatePagefilePrivilege 2692 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1980 2692 chrome.exe 86 PID 2692 wrote to memory of 1980 2692 chrome.exe 86 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2212 2692 chrome.exe 87 PID 2692 wrote to memory of 2488 2692 chrome.exe 88 PID 2692 wrote to memory of 2488 2692 chrome.exe 88 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89 PID 2692 wrote to memory of 3216 2692 chrome.exe 89
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Mehlwand.zip1⤵PID:1856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffac9ebab58,0x7ffac9ebab68,0x7ffac9ebab782⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:22⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4444 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4776 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1928,i,6287894498053206465,750296076243113903,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3016
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb91739001eaee169d7eedfb35b7bccc
SHA1b271b811223dfeaedc3bce3ae4dfe395f648417f
SHA256ca15bddb980966f08d652b706a901acfb159733b648213323620d67b3a596b84
SHA51225228ba2b858c37951819524982d137801a2a47b0f899dab5627bf9fed4a12e8eb15026a5bc2a87b5438956edd0686bcab9994e72fcf4c6395f5503b4df55d64
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5b18eea2e1d77b5e9c2f9df48d34b9314
SHA1609d829860b4edb4d1bc9b172ea9d0e9e3fcb78f
SHA256b986c5bdf27ac6acbd30ffe025d485505d5ecc7d597426211eb5ef5b4be990f6
SHA5121c5be92c0dec217d8ad60e6d5f1b17ee9bd702059f820637a1875bd7b6f6dc05a5cb3981187c9596d75e246e4575808fdbda7cd105a249821d2cd809718a22dc
-
Filesize
6KB
MD5f697414cae820e2c5099bd2324ea1407
SHA1f49ed93b0bec195aeb4657af26b3ea6c884a5332
SHA256ea41d289181c422c91648414748516b1dad3984babda715fb49ef5e9d201d0e1
SHA512956dc0441f1ace14c9a2136ba6adf6cdca9f1c268495b71ae3bff78cb42c72581e7c31ccb02109109bb70cd22823c3704337cc1e73f99a204e93324ebf53b967
-
Filesize
6KB
MD50b68f1fb73c0cc146eee925db4e0955e
SHA12515acc6316d3aa5074383e936d47eb9e7012896
SHA2564582e89ee9bdb3fd974abe74fdd6d4e54ff19e7140cd719d2f03708d4a46d850
SHA5126231ba6d5a53e5273d38794f6639028df5c061d0905726933e10f17bcd7f1de64746e84cfbaf6df1b9165953597289c91b65d843e51c31d5127716288080b811
-
Filesize
285KB
MD50fc9f5784ab814c16dd75659da8b4d11
SHA1d8e91e6cf1e84cbf8964116c281b0b7184aae0b6
SHA2564ff46f899bce9b5dc23095b509f67ec9d0479f83091a93830a0074863f1ce649
SHA5126cf147a95c04fd7e9defda5ea6b9a40e676b0fc3fda8e2ebaa3d6a854987a953fa7f71fb33df0eef8bb7a9fabcbf9b5769fbbbc043d3058179539adcff9f447a
-
Filesize
285KB
MD5ed170cd06d5d277adae859478153de01
SHA168a1b18cd16c0d96adeeec16055d3388e067dfce
SHA2568814ab51ab4bcbbf3e9bb012038a0140146a37fd465ec09796c7fb491eb117e3
SHA5128db383df79539ec01df0cc233dbb0084dc180c86e961b8f78af1cc963118ce9ccf34cd803a10ca9d340f61255a179c6d299a4418c8c8c190b9590543b8e4e22b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58