Overview
overview
8Static
static
3Malwarebyt...in.zip
windows7-x64
1Malwarebyt...in.zip
windows10-2004-x64
1MBSetup.exe
windows7-x64
8MBSetup.exe
windows10-2004-x64
8Malwarebyt...ort.md
windows7-x64
3Malwarebyt...ort.md
windows10-2004-x64
3Malwarebyt...est.md
windows7-x64
3Malwarebyt...est.md
windows10-2004-x64
3Malwarebyt...et.bat
windows7-x64
3Malwarebyt...et.bat
windows10-2004-x64
3Malwarebyt...et.ps1
windows7-x64
6Malwarebyt...et.ps1
windows10-2004-x64
6Malwarebyt...DME.md
windows7-x64
3Malwarebyt...DME.md
windows10-2004-x64
3Malwarebyt...um.exe
windows7-x64
7Malwarebyt...um.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
1563s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
Malwarebytes-Premium-Bypass-main.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Malwarebytes-Premium-Bypass-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MBSetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
MBSetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Malwarebytes-Premium-Bypass-main/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Malwarebytes-Premium-Bypass-main/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Malwarebytes-Premium-Bypass-main/.github/ISSUE_TEMPLATE/feature_request.md
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Malwarebytes-Premium-Bypass-main/.github/ISSUE_TEMPLATE/feature_request.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Malwarebytes-Premium-Bypass-main/Malwarebytes-Premium-Reset.bat
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Malwarebytes-Premium-Bypass-main/Malwarebytes-Premium-Reset.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Malwarebytes-Premium-Bypass-main/Malwarebytes-Premium-Reset.ps1
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Malwarebytes-Premium-Bypass-main/Malwarebytes-Premium-Reset.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Malwarebytes-Premium-Bypass-main/README.md
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Malwarebytes-Premium-Bypass-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Malwarebytes-Premium-Bypass-main/SAA MalwareBytes Premium.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Malwarebytes-Premium-Bypass-main/SAA MalwareBytes Premium.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
Malwarebytes-Premium-Bypass-main/.github/ISSUE_TEMPLATE/feature_request.md
-
Size
595B
-
MD5
174545e1d9daff8020525fdd1e020411
-
SHA1
f6867a2f0417fe89a0f2008730ee19dd38422021
-
SHA256
1f48c52f209a971b8e7eae4120144d28fcf8ee38a7778a7b4d8cf1ab356617d2
-
SHA512
b18005cfe7409fde541b934131c32c2eecdc4a8fd62cd558f274a25262c0e6b0b8fd27674ee55d6d4e4c435d49d580a077181fe8b15b095c39736b01ff4ee537
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 AcroRd32.exe 2820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2816 1504 cmd.exe 31 PID 1504 wrote to memory of 2816 1504 cmd.exe 31 PID 1504 wrote to memory of 2816 1504 cmd.exe 31 PID 2816 wrote to memory of 2820 2816 rundll32.exe 32 PID 2816 wrote to memory of 2820 2816 rundll32.exe 32 PID 2816 wrote to memory of 2820 2816 rundll32.exe 32 PID 2816 wrote to memory of 2820 2816 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Malwarebytes-Premium-Bypass-main\.github\ISSUE_TEMPLATE\feature_request.md1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Malwarebytes-Premium-Bypass-main\.github\ISSUE_TEMPLATE\feature_request.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Malwarebytes-Premium-Bypass-main\.github\ISSUE_TEMPLATE\feature_request.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD518d62b19682a3df70a300e43bb768b02
SHA17a1a298fe8505bc3c1a138a96aab3511e47870f7
SHA256ec2a1fa07fb1a431f3853b89d38afd7ef77c22528ff97b4d4ef5ad4389b4119e
SHA51217f43ae83790f6ed682408d54e3eac590f1a86582f376effe850416dba67ecf4617abf54759f64f9db731d0cf4e35f5acb90f594011f84176eb57cc3556ec0f0