Overview
overview
9Static
static
7Downloads ...v2.exe
windows7-x64
9Downloads ...v2.exe
windows10-2004-x64
9Downloads ...S2.exe
windows7-x64
1Downloads ...S2.exe
windows10-2004-x64
1Downloads ...ir.exe
windows7-x64
1Downloads ...ir.exe
windows10-2004-x64
8Downloads ...er.exe
windows7-x64
9Downloads ...er.exe
windows10-2004-x64
9Downloads ...or.exe
windows7-x64
9Downloads ...or.exe
windows10-2004-x64
9Downloads ...q1.exe
windows7-x64
5Downloads ...q1.exe
windows10-2004-x64
5Downloads ...ix.bat
windows7-x64
1Downloads ...ix.bat
windows10-2004-x64
1Downloads ...ix.bat
windows7-x64
9Downloads ...ix.bat
windows10-2004-x64
9Downloads ...ix.bat
windows7-x64
1Downloads ...ix.bat
windows10-2004-x64
1Downloads ...b1.exe
windows7-x64
5Downloads ...b1.exe
windows10-2004-x64
5Downloads ...ix.bat
windows7-x64
9Downloads ...ix.bat
windows10-2004-x64
9Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 23:20
Behavioral task
behavioral1
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Blocker v2.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Blocker v2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/CS2.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/CS2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Loud Chair.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Loud Chair.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Perm Woofer.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Perm Woofer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Privacy Protector.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Privacy Protector.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/Byr723V3Cq1.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/Byr723V3Cq1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/bsod fix.bat
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/bsod fix.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/w11 fix.bat
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/w11 fix.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/bsod fix.bat
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/bsod fix.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/nRi28Wtqb1.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/nRi28Wtqb1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/w11 fix.bat
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/w11 fix.bat
Resource
win10v2004-20240802-en
General
-
Target
Downloads 12.6.24/Downloads 12.6.24/Downloads/Perm Woofer.exe
-
Size
28.1MB
-
MD5
6d580b009bd7e0c1d5d2e1da54191743
-
SHA1
4e3568f77dfb112c6a30c9f04fece99b0a219153
-
SHA256
33db059ad0344af99a91e5dc4645b4ed21f6476301dbcdd9b7938fa9f5b240fa
-
SHA512
2e7b119a035295da2a1c666f6b4d1c2de1cc2aaf2392dc4c4f76bb4edef74022902b50b539aa26a0c035c7f4d87442dc498236a37ea50e5a7408af355bad0325
-
SSDEEP
786432:DEpTc844UEVZOh3yWhcs8sCir3G9uyRpwn3uY4dws:4S8WlinvU3yu+E3p7s
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Perm Woofer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Perm Woofer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Perm Woofer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Perm Woofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Perm Woofer.exe -
Processes:
Perm Woofer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Perm Woofer.exe -
Drops file in System32 directory 7 IoCs
Processes:
Perm Woofer.exedescription ioc process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Perm Woofer.exe File opened for modification C:\Windows\System32\config\RegBack\{ASUS} Perm Woofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Perm Woofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Perm Woofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Perm Woofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Perm Woofer.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Perm Woofer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Perm Woofer.exepid process 2720 Perm Woofer.exe -
Drops file in Windows directory 4 IoCs
Processes:
Perm Woofer.exedescription ioc process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Perm Woofer.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Perm Woofer.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Perm Woofer.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Perm Woofer.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
Perm Woofer.exepid process 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe 2720 Perm Woofer.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Perm Woofer.exedescription pid process target process PID 2720 wrote to memory of 2152 2720 Perm Woofer.exe cmd.exe PID 2720 wrote to memory of 2152 2720 Perm Woofer.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Downloads 12.6.24\Downloads 12.6.24\Downloads\Perm Woofer.exe"C:\Users\Admin\AppData\Local\Temp\Downloads 12.6.24\Downloads 12.6.24\Downloads\Perm Woofer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2152