Overview
overview
8Static
static
3ScreamSplo...ts.dll
windows7-x64
1ScreamSplo...ts.dll
windows10-2004-x64
1ScreamSplo...LL.dll
windows7-x64
5ScreamSplo...LL.dll
windows10-2004-x64
5ScreamSplo...it.dll
windows7-x64
1ScreamSplo...it.dll
windows10-2004-x64
1ScreamSplo...on.dll
windows7-x64
1ScreamSplo...on.dll
windows10-2004-x64
1ScreamSplo...de.dll
windows7-x64
1ScreamSplo...de.dll
windows10-2004-x64
8ScreamSplo...PI.dll
windows7-x64
1ScreamSplo...PI.dll
windows10-2004-x64
1ScreamSplo...it.exe
windows7-x64
6ScreamSplo...it.exe
windows10-2004-x64
6ScreamSplo...er.exe
windows7-x64
3ScreamSplo...er.exe
windows10-2004-x64
3ScreamSplo...er.exe
windows7-x64
1ScreamSplo...er.exe
windows10-2004-x64
3ScreamSplo...32.dll
windows7-x64
3ScreamSplo...32.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
ScreamSploit/EasyExploits.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ScreamSploit/EasyExploits.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
ScreamSploit/EasyExploitsDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ScreamSploit/EasyExploitsDLL.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
ScreamSploit/ICSharpCode.AvalonEdit.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
ScreamSploit/ICSharpCode.AvalonEdit.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
ScreamSploit/Newtonsoft.Json.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
ScreamSploit/Newtonsoft.Json.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
ScreamSploit/OxygenBytecode.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
ScreamSploit/OxygenBytecode.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
ScreamSploit/OxygenU_API.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
ScreamSploit/OxygenU_API.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
ScreamSploit/ScreamSploit.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
ScreamSploit/ScreamSploit.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
ScreamSploit/ScreamUpdater.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
ScreamSploit/ScreamUpdater.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
ScreamSploit/bin/rbxfpsunlocker.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
ScreamSploit/bin/rbxfpsunlocker.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
ScreamSploit/discord-rpc-w32.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
ScreamSploit/discord-rpc-w32.dll
Resource
win10v2004-20240704-en
General
-
Target
ScreamSploit/ScreamSploit.exe
-
Size
458KB
-
MD5
30a0cec02601ccb251e3658ee53082ea
-
SHA1
f7c0e1566d081d838c6ebb16d4dd98467bfec408
-
SHA256
483f76ab0f5d9e1fe4c245913d86492c0eda0601541ba9fc99947aa61b433835
-
SHA512
44818847358ae956053948822e5acb646b1174f65e340d0aea5218d492556771c440a24bbf195619cf697362821743853f9c02a77b6b0b8956a3e9a0496ce12e
-
SSDEEP
12288:uj9WnmFzCbOEfSBdYziDTBfp/99tmqxloz4Pljz4:JmUbO7dYzkB1lmGW0tj0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2160 2320 WerFault.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 ScreamSploit.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2160 2320 ScreamSploit.exe 30 PID 2320 wrote to memory of 2160 2320 ScreamSploit.exe 30 PID 2320 wrote to memory of 2160 2320 ScreamSploit.exe 30 PID 2320 wrote to memory of 2160 2320 ScreamSploit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ScreamSploit\ScreamSploit.exe"C:\Users\Admin\AppData\Local\Temp\ScreamSploit\ScreamSploit.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 11722⤵
- Program crash
PID:2160
-