Overview
overview
7Static
static
3untitledSpammer.zip
windows7-x64
1untitledSpammer.zip
windows10-2004-x64
1untitledSp...on.bat
windows7-x64
1untitledSp...on.bat
windows10-2004-x64
1untitledSp...nt.txt
windows7-x64
1untitledSp...nt.txt
windows10-2004-x64
1untitledSp...ta.txt
windows7-x64
1untitledSp...ta.txt
windows10-2004-x64
1untitledSp...ay.txt
windows7-x64
1untitledSp...ay.txt
windows10-2004-x64
1untitledSp...is.txt
windows7-x64
1untitledSp...is.txt
windows10-2004-x64
1untitledSp...es.txt
windows7-x64
1untitledSp...es.txt
windows10-2004-x64
1untitledSp...ns.txt
windows7-x64
1untitledSp...ns.txt
windows10-2004-x64
1untitledSp...id.txt
windows7-x64
1untitledSp...id.txt
windows10-2004-x64
1untitledSp...12.pyc
windows7-x64
3untitledSp...12.pyc
windows10-2004-x64
3untitledSp...per.py
windows7-x64
3untitledSp...per.py
windows10-2004-x64
3untitledSp...ed.exe
windows7-x64
7untitledSp...ed.exe
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
untitledSpammer.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
untitledSpammer.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
untitledSpammer/Installation.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
untitledSpammer/Installation.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
untitledSpammer/data/channelamount.txt
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
untitledSpammer/data/channelamount.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
untitledSpammer/data/channeldata.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
untitledSpammer/data/channeldata.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
untitledSpammer/data/delay.txt
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
untitledSpammer/data/delay.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
untitledSpammer/data/emojis.txt
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
untitledSpammer/data/emojis.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
untitledSpammer/data/messages.txt
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
untitledSpammer/data/messages.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
untitledSpammer/data/tokens.txt
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
untitledSpammer/data/tokens.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
untitledSpammer/data/valid.txt
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
untitledSpammer/data/valid.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
untitledSpammer/extras/__pycache__/scraper.cpython-312.pyc
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
untitledSpammer/extras/__pycache__/scraper.cpython-312.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
untitledSpammer/extras/scraper.py
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
untitledSpammer/extras/scraper.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
untitledSpammer/untitled.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
untitledSpammer/untitled.exe
Resource
win10v2004-20240709-en
General
-
Target
untitledSpammer/untitled.exe
-
Size
36.0MB
-
MD5
fe5cccfedaa4196408f2baf125b2417d
-
SHA1
d683df014ed84833aca0fac1c77d9636b860f206
-
SHA256
8796b87e9a0f817ddfb102c6a12f468bbffe8de2a0648144ae3492c80513ad5b
-
SHA512
162416803412271a1407da9cfd2b0ceca854a5649ba26d654a8473395d81d367308a025097d53a86ab9c4f9fc68062253e1246b5de32a992e115e49735c01069
-
SSDEEP
786432:YMvizlZOrHf7eKA3uTz2l0b19mzjb25AJDONn+CTzl/uk+dbjNw:YMvlzan3FlO19mHxhON+CTzl/KdHu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2520 untitled.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 untitled.exe 2520 untitled.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2520 2072 untitled.exe 32 PID 2072 wrote to memory of 2520 2072 untitled.exe 32 PID 2072 wrote to memory of 2520 2072 untitled.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\untitledSpammer\untitled.exe"C:\Users\Admin\AppData\Local\Temp\untitledSpammer\untitled.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\onefile_2072_133662208399806000\untitled.exeC:\Users\Admin\AppData\Local\Temp\untitledSpammer\untitled.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35