Overview
overview
4Static
static
3Scratch 3....up.exe
windows11-21h2-x64
4$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDIR/UAC.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDIR/app-32.7z
windows11-21h2-x64
3LICENSES.c...m.html
windows11-21h2-x64
1Scratch 3.exe
windows11-21h2-x64
1d3dcompiler_47.dll
windows11-21h2-x64
3ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows11-21h2-x64
3resources/elevate.exe
windows11-21h2-x64
1swiftshade...GL.dll
windows11-21h2-x64
1swiftshade...v2.dll
windows11-21h2-x64
1vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3Uninstall ... 3.exe
windows11-21h2-x64
4$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDIR/UAC.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-07-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
Scratch 3.29.1 Setup.exe
Resource
win11-20240704-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UAC.dll
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app-32.7z
Resource
win11-20240704-en
Behavioral task
behavioral7
Sample
LICENSES.chromium.html
Resource
win11-20240508-en
Behavioral task
behavioral8
Sample
Scratch 3.exe
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
d3dcompiler_47.dll
Resource
win11-20240704-en
Behavioral task
behavioral10
Sample
ffmpeg.dll
Resource
win11-20240704-en
Behavioral task
behavioral11
Sample
libEGL.dll
Resource
win11-20240704-en
Behavioral task
behavioral12
Sample
libGLESv2.dll
Resource
win11-20240704-en
Behavioral task
behavioral13
Sample
resources/elevate.exe
Resource
win11-20240704-en
Behavioral task
behavioral14
Sample
swiftshader/libEGL.dll
Resource
win11-20240704-en
Behavioral task
behavioral15
Sample
swiftshader/libGLESv2.dll
Resource
win11-20240704-en
Behavioral task
behavioral16
Sample
vk_swiftshader.dll
Resource
win11-20240508-en
Behavioral task
behavioral17
Sample
vulkan-1.dll
Resource
win11-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240704-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240704-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240704-en
Behavioral task
behavioral22
Sample
Uninstall Scratch 3.exe
Resource
win11-20240704-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240704-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/UAC.dll
Resource
win11-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240508-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240704-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240704-en
General
-
Target
Scratch 3.exe
-
Size
116.1MB
-
MD5
94d3482e8ef37c57dd752893c9b8cde1
-
SHA1
ad4e73aeeefaecf180670d8911e80694e1ac60ce
-
SHA256
4e4f12f197b1901e1697a94a2b6c1231562c06afe07642192466f0f4bf65929a
-
SHA512
4d33b7c0974c835aaff1384d7885eb925cec9fd4dd65aea6da7a99c1c9ea764f1f56bc6936cff25e657bc998874611d273331c642a893a8668f33d1425b059da
-
SSDEEP
1572864:YJSXNhYcY4VAiiW+fioUzAj03KgjjNCABkrgtUO06pidI3aK7/VusRHd9c1Bku/f:pZdYDI3adv49G4ZE
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
Scratch 3.exeScratch 3.exeScratch 3.exeScratch 3.exeScratch 3.exepid process 4304 Scratch 3.exe 4304 Scratch 3.exe 1008 Scratch 3.exe 1008 Scratch 3.exe 4396 Scratch 3.exe 4396 Scratch 3.exe 5064 Scratch 3.exe 5064 Scratch 3.exe 3576 Scratch 3.exe 3576 Scratch 3.exe 3576 Scratch 3.exe 3576 Scratch 3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1568 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Scratch 3.exedescription pid process target process PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 3340 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4304 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4304 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4304 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 1008 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 1008 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 1008 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 5064 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 5064 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 5064 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4396 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4396 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4396 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe PID 2664 wrote to memory of 4744 2664 Scratch 3.exe Scratch 3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe" --type=gpu-process --field-trial-handle=1524,8664766506857643593,16847614897510499196,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\Scratch" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 /prefetch:22⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1524,8664766506857643593,16847614897510499196,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --host-resolver-rules="MAP device-manager.scratch.mit.edu 127.0.0.1" --user-data-dir="C:\Users\Admin\AppData\Roaming\Scratch" --mojo-platform-channel-handle=2232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Scratch" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1524,8664766506857643593,16847614897510499196,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2388 /prefetch:12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Scratch" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1524,8664766506857643593,16847614897510499196,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2556 /prefetch:12⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Scratch" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1524,8664766506857643593,16847614897510499196,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1568 /prefetch:12⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1524,8664766506857643593,16847614897510499196,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=audio --host-resolver-rules="MAP device-manager.scratch.mit.edu 127.0.0.1" --user-data-dir="C:\Users\Admin\AppData\Roaming\Scratch" --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe"C:\Users\Admin\AppData\Local\Temp\Scratch 3.exe" --type=gpu-process --field-trial-handle=1524,8664766506857643593,16847614897510499196,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\Scratch" --gpu-preferences=UAAAAAAAAADoAAAIAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
660B
MD5cebe76ecbdbef67e4ffd129d4bf1eda6
SHA164533fd90a21c2fb5774b9808986357085a148b4
SHA2560288b77444bc695100e7c81ed82d9b89297be2c1e04b518a6fdaed71fcc4a3a3
SHA51296e18c5238915204a9519291ffaf3cd9a94223093194eb7e5064f322680883a26cbce389772bc3a645c4d481546f321ec9660de1203a11329d323aa2af9f4160
-
Filesize
1KB
MD507d46eeb3cd3217b160d1fa2da729f7c
SHA1acd0c2e82c951e63a3c1d988c39f10568a546fd5
SHA256080495a81898c5a9ec6182c3b5a43f0c47e25aa9a01c4856dda877b957de04ca
SHA512e06fd017a8da72283aa95c4a536af4e02d023053fdd98ab4a9f33e62da9ec69ef6d1f984fdb2fe262989f9bfcb6ec2f6ff84781a6a7b17ec18f8b57e6b5dcdfd
-
Filesize
55B
MD56b346293ce1d5185c3890e7fb5edfc43
SHA11ab968cdd3f1ec77522adc70ac47194e971ecbb6
SHA256286daf127dacd9f805419bf7fc5d349850e488ea9ef01a49348e61c74a6e2f00
SHA5129fa811041284191f4092ac880ed47a9fd6284712c9ace4d7b2a2cfe93675fdaf881d59d417a13aaf5ae8efd9b4c778173fb5ef177dc77422f3fe9552cbeca53f
-
Filesize
1KB
MD554d14386b87be7f18d9b589e5af784b8
SHA1e13874fa960cee11c731f5c576a4d979def04345
SHA256c324299fad8a9654d3979d330fa6f0324118024c990146a478600464ee1b392d
SHA512879bb609132ca3c10219925d9304cf1ba8c68d880e4b2be1ca93d7756e56af5edae97a462db3461e4966e1c1f670042edab4a0e696c4472225340bb3da3ed972