Overview
overview
8Static
static
30day_Cheat_Engine.rar
windows10-2004-x64
8commonmodulelist.txt
windows10-2004-x64
1defines.lua
windows10-2004-x64
3donottrace.txt
windows10-2004-x64
1driver64.dat
windows10-2004-x64
3include/_mingw.h
windows10-2004-x64
3include/assert.h
windows10-2004-x64
3include/celib.h
windows10-2004-x64
3include/conio.h
windows10-2004-x64
3include/ctype.h
windows10-2004-x64
5include/dir.h
windows10-2004-x64
3include/direct.h
windows10-2004-x64
3include/dirent.h
windows10-2004-x64
3languages/...64.pot
windows10-2004-x64
1mrgg.sys
windows10-2004-x64
1mytes0day0-x86_64.exe
windows10-2004-x64
6mytes0day0-x86_64.exe
windows10-2004-x64
6packfiles.bat
windows10-2004-x64
1standalonephase1.exe
windows10-2004-x64
3test1-x86_64.exe
windows10-2004-x64
tiny.exe
windows10-2004-x64
3vmdisk.vbs
windows10-2004-x64
1win32/dbghelp.dll
windows10-2004-x64
3win32/sqlite3.dll
windows10-2004-x64
3win32/symsrv.dll
windows10-2004-x64
3win32/symsrv.yes
windows10-2004-x64
3win64/dbghelp.dll
windows10-2004-x64
1win64/old/dbghelp.dll
windows10-2004-x64
1win64/old/symsrv.dll
windows10-2004-x64
1win64/sqlite3.dll
windows10-2004-x64
1win64/symsrv.dll
windows10-2004-x64
1win64/symsrv.yes
windows10-2004-x64
3Analysis
-
max time kernel
1702s -
max time network
1676s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
0day_Cheat_Engine.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
commonmodulelist.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
defines.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
donottrace.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
driver64.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
include/_mingw.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
include/assert.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
include/celib.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
include/conio.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
include/ctype.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
include/dir.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
include/direct.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
include/dirent.h
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
languages/mytes0day0-x86_64.pot
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
mrgg.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
mytes0day0-x86_64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
mytes0day0-x86_64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
packfiles.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
standalonephase1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
test1-x86_64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
tiny.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
vmdisk.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
win32/dbghelp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
win32/sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
win32/symsrv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
win32/symsrv.yes
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
win64/dbghelp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
win64/old/dbghelp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
win64/old/symsrv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
win64/sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
win64/symsrv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
win64/symsrv.yes
Resource
win10v2004-20240802-en
General
-
Target
include/ctype.h
-
Size
9KB
-
MD5
22e5a00491e32d15b40b196397ad01c1
-
SHA1
b0db6fcbf4abd2f4fdea2771399c1e502d9f8106
-
SHA256
4cfaaa43b3f7414984126e8b1cdf65f9dac0ef68d9a3396be0b8828376a74a6b
-
SHA512
28839104776441738233334a20de6ce3ada51179fb50366c27ab60432949fc78e1ccf735d2e80216f8779d84328634005c322d0010875e8fe0ff33d699ecc114
-
SSDEEP
192:aK0sBzLLoy8q3JHZDrs+UAt0g7WnBeaIlzjD:EALLb8ars+Flzf
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
NOTEPAD.EXEdescription ioc process File created C:\Windows\System32\ctype.h NOTEPAD.EXE File opened for modification C:\Windows\System32\ctype.h NOTEPAD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 41 IoCs
Processes:
NOTEPAD.EXEOpenWith.execmd.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags NOTEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 560031000000000002598d66100057696e646f777300400009000400efbe874f77480259ca852e000000000600000000010000000000000000000000000000001eb00d01570069006e0064006f0077007300000016000000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 00000000ffffffff NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 19002f433a5c000000000000000000000000000000000000000000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 = 5a003100000000000259ca85100053797374656d33320000420009000400efbe874f77480259ca852e000000b90c00000000010000000000000000000000000000000be76400530079007300740065006d0033003200000018000000 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\NodeSlot = "2" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\MRUListEx = ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" NOTEPAD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3640 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
OpenWith.exeNOTEPAD.EXEpid process 1100 OpenWith.exe 3640 NOTEPAD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
NOTEPAD.EXEpid process 3640 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
OpenWith.exeNOTEPAD.EXEpid process 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 3640 NOTEPAD.EXE 3640 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
OpenWith.exedescription pid process target process PID 1100 wrote to memory of 3640 1100 OpenWith.exe NOTEPAD.EXE PID 1100 wrote to memory of 3640 1100 OpenWith.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\include\ctype.h1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\include\ctype.h2⤵
- Drops file in System32 directory
- Modifies registry class
- Opens file in notepad (likely ransom note)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx