Overview
overview
10Static
static
3FreePiano/...no.exe
windows11-21h2-x64
6FreePiano/...f2.dll
windows11-21h2-x64
10FreePiano/...p4.exe
windows11-21h2-x64
3FreePiano/...no.dll
windows11-21h2-x64
1QWERTY/Mid...ty.exe
windows11-21h2-x64
1QWERTY/SDL2.dll
windows11-21h2-x64
1QWERTY/portmidi.dll
windows11-21h2-x64
1setuploopbe1.exe
windows11-21h2-x64
7$PLUGINSDI...PI.dll
windows11-21h2-x64
1$PLUGINSDI...ns.dll
windows11-21h2-x64
8$PLUGINSDI...nu.dll
windows11-21h2-x64
5$PLUGINSDI...em.dll
windows11-21h2-x64
$PLUGINSDI...fo.dll
windows11-21h2-x64
$PLUGINSDI...st.exe
windows11-21h2-x64
1$PLUGINSDI...e1.sys
windows11-21h2-x64
1$PLUGINSDI...ec.dll
windows11-21h2-x64
3General
-
Target
JfPvxHzKLqqy.zip
-
Size
4.9MB
-
Sample
240811-eppqqsyckg
-
MD5
b465fbb4ac490a317784c951cc3014b8
-
SHA1
a3c16d70c6f6058a3c43baf9bcd9924e4e545043
-
SHA256
5834f6ae3522131494c225a93c30173430be80b5c144519b265395c54f35172b
-
SHA512
80a8ee81e95802f570986384b7d068833c0368dba4a63c39b16257efc398f38b7f7f716821185fb0701978bbce486e9bc523fb61d31a0bba9e568ee17c060156
-
SSDEEP
98304:vTxDa956OCei+WuHMycOenShP7B1Plb83ixEI0/6JZwionhdCuDYK6qMd:7OBrWusqP7BZoI0zi6dCuh69
Static task
static1
Behavioral task
behavioral1
Sample
FreePiano/freepiano.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
FreePiano/plugins/plugin_sf2.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
FreePiano/plugins/plugin_xfmp4.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
FreePiano/vsti/mdaPiano.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
QWERTY/Midi to Qwerty.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
QWERTY/SDL2.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
QWERTY/portmidi.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
setuploopbe1.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/DIFxAPI.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/drvinst.exe
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/loopbe1.sys
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240802-en
Malware Config
Extracted
warzonerat
168.61.222.215:5400
Extracted
modiloader
https://drive.google.com/u/0/uc?id=1TcSctGVBajYMA7CFDc158wpvqkpxmkhJ&export=download
Extracted
remcos
1.7 Pro
Host
nickman12-46565.portmap.io:46565
nickman12-46565.portmap.io:1735
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
Userdata.exe
-
copy_folder
Userdata
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%WinDir%\System32
-
mouse_option
false
-
mutex
remcos_vcexssuhap
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCry-main.zip\WannaCry-main\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
FreePiano/freepiano.exe
-
Size
1.3MB
-
MD5
0742c857b186d7178a6f13c16765086c
-
SHA1
082a0aebe67a8991a968972127d2ee8bad6bab1d
-
SHA256
f53c7cdf9fa04426f4e1100d7347d35eeb4fbd7c6795651412d229fa77ab8698
-
SHA512
d2d6877092dfb2483a0b9efa2b7774178185c9c477b66baaaf38b30b672f023008e2e8a2289f205f3c73ead24f5360b578f6a56100c9687422b060f1cb5c673d
-
SSDEEP
24576:GVGj/JdqXfc9NubYNr7dxGycjkUTZZWIDR7p35DNy09x/:GVGjhdjTWarBxGYUTbW0d57V
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
FreePiano/plugins/plugin_sf2.dll
-
Size
329KB
-
MD5
94c59894d08d1c749f63682cb8797095
-
SHA1
3fc15161462973569f91e2b3b880d64c385b2689
-
SHA256
d0b80fbf7ebc9e392813beaf518d856204338e7127dc98c80b8e0396b9fea09f
-
SHA512
6ce996a7f686b19a4a146b8ddbfb54b03f0a4ed09995618305ef6ed644b44e3ca5733f5a0a332499b243288d3578c3b26c2240c086ab91b3e5ec9f23bf9879ea
-
SSDEEP
6144:OfZpm6lJwGaoGBM7lTWaAmlTSKQkcgiofhk2Bf50l3Mx:OfZJaoGp7yTwkbio8
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
-
-
Target
FreePiano/plugins/plugin_xfmp4.exe
-
Size
1.7MB
-
MD5
1c6f91887e9d23c721ed5475b566d294
-
SHA1
f505b6e02047b082038110b22e4e48137fe3f3fc
-
SHA256
3b2dbd1e356d3a32914f5db00a2dc10d697f90568adfd17d739ebcceeabe1c8d
-
SHA512
c1af6c6187c1f7d67ce212aa15df2ff284354f442cb5bf3bdd38674e7b96443b90d162af8f845c94991f8d29ebde13742c84e79e7e2862b955bc645e08e753aa
-
SSDEEP
24576:oTLRacbJBSmMDs1mppQRqWJ0U6Ae8yYzWDILv+uysEa4rl5kSauS2emE8dvTjfK7:GNamMeu4Evl5N7jfTk3mM
Score3/10 -
-
-
Target
FreePiano/vsti/mdaPiano.dll
-
Size
1.2MB
-
MD5
5e76e2ad4a687607cff24982c52c8baf
-
SHA1
2435090a8e6b56b2e1aa4cc14b9861a34c090519
-
SHA256
0be2c93d003df789c7c403d1600b226b0903b4f7cee65322de4e4416aaf9dc22
-
SHA512
de9785844b50bf6fbe2e49a8e4088448a8ccee747250b012ccb31d487ac6f2ec0763a328bc2669b2a4d40c0b3f7a2657a174b6e23c1e18780908ec5b22fbd34b
-
SSDEEP
24576:qBPR0oMw19/aEkwJtqQbZSqpWgeNKglzvQDhi9vWa2IiGhyY5P0:qBp+7wJtrbZPshKezvQtiM5IiQyE
Score1/10 -
-
-
Target
QWERTY/Midi to Qwerty.exe
-
Size
633KB
-
MD5
daccc6a58f6c2417af857515fc652801
-
SHA1
4eedec65a5d5cc7f564ba4d61e92d4689ec09e0b
-
SHA256
fdc2e3f71edf456bfb5ff0e9d40a37455e928ba3cc47c84fbc839481ba5f5202
-
SHA512
6f612d2feca403a0c59ae0dd6e14599d32a97cb3d9fea14aedd4f79ed0a158bd71b535d8e36434cf07f505e75ea4e8b10e23af3d14e10c1188872bebec5d1e18
-
SSDEEP
12288:XCSqsbdmp6WTL7+MGBolVhatpL1CUn9X5Gp:y64p1TL7+FBolVhaH1CUn8
Score1/10 -
-
-
Target
QWERTY/SDL2.dll
-
Size
2.1MB
-
MD5
8cefc3cbc917011cefacc145945f0bbe
-
SHA1
15ee32dfda843229adc4be8df7a267da0e5a61d1
-
SHA256
74889602f25135db1489529dc0a5170f65fc756886b744aa6a414529b8abd3d9
-
SHA512
2b26813d2482a51b8bcc6df3c50de0735c6f10ce89e11a7aeff4e7ec4d1def5ff93cf03ed09cda1d5039807e63d8dfc35e44d3060330e3420ab0dafa993bc949
-
SSDEEP
24576:mdlZagmDN5+fmLybQeeeB5eMpZV3iItgVK8IIVb7Z00Z6O5c4ObjbtnG4+QDYnTT:euqo75Vbt5cAV309/Fof4J/Urvmf+
Score1/10 -
-
-
Target
QWERTY/portmidi.dll
-
Size
31KB
-
MD5
8435cf62e67bd4b2e59a46907381fcf7
-
SHA1
c026dd619c9b720c4440bcd8899061dce5c059e6
-
SHA256
0d64c046c16d8d089f55c45d3bae20f577204783c2c8fad100bb26d897383d9b
-
SHA512
d9f294e660bff092397969e49cbb7b8c1a7a3063b9abe865e3ba167a0da05dec456a8d273e8dbcaa0ff3387584211246c80e575de1b66efac8c22c888f39d7cd
-
SSDEEP
384:hkaJm/t67EBgc5F8idwV9P9P7OWjAE8y2k8izHh3hSHAuG+sZa3dj4OeDq9Gk4gp:kYFDf0SAE9fzHh3hIX4Z6qdaaq
Score1/10 -
-
-
Target
setuploopbe1.exe
-
Size
992KB
-
MD5
143a3ec92e603a8eb863bef2d6f4da12
-
SHA1
fc0a87961f1fa5d645ea63689b0e23b491092891
-
SHA256
0958b39c23e02f86ba63f520cfc333842e3f7c31e197416c12f2718756ecb9be
-
SHA512
49ce58b19b86f9d2062feeed62f15c87214a5324977ab94c3421add26f79d48a29e0d590266c25c8acf01bbcf369af6bc27b1e749e0761726210724d695a2116
-
SSDEEP
24576:H1FFxG1QXI0iWkKZnj5v747E2As7mb2uC4OS:lxGW4SvcoPgIC4L
Score7/10-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/DIFxAPI.dll
-
Size
513KB
-
MD5
f5558c67a3adb662d43d40a1cbde4160
-
SHA1
74ad5dd123037cf4d434c5073cbe04c0bcba4e79
-
SHA256
83c43d65084cd202aa9982af6d87c963a05035f1e2cdac48304fa299584e3242
-
SHA512
6df9f780adda4f52d7fbb3baa6af3028c0523ff514f1df0e7dfe380ce21116e09a6f1f3820c316a9af7e16043eb04cdbfe5e885ca24528661c05e32cd18b2046
-
SSDEEP
12288:6sxYL+kJmoPdVp6s3EJBjCvuF17+2NdJfx:6sxwSoPdVoBjCvuF17+2NdJfx
Score1/10 -
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
0dc0cc7a6d9db685bf05a7e5f3ea4781
-
SHA1
5d8b6268eeec9d8d904bc9d988a4b588b392213f
-
SHA256
8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
-
SHA512
814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
SSDEEP
192:n6d+dHXLHQOPiY53uiUdigyU+WsPdc/A1A+2jPK72dwF7dBEnbok:n6UdHXcIiY535zBt2jP+BEnbo
Score8/10-
Disables Task Manager via registry modification
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
-
-
Target
$PLUGINSDIR/StartMenu.dll
-
Size
7KB
-
MD5
4e96f412a8cc653053d5d918df6b0836
-
SHA1
a3c7d59043feecb1603874b27c23d4166b341f2d
-
SHA256
e4a54bfc327986a89165bdef361069810aaa985c3abecd442c786725fabaf977
-
SHA512
2fec61b4ad31250bdbdbbfd551d831801790b96902c67200661e8f4f2753378bbf6c0c88b12e1be9173a29597827c1c4809511b6d52666dc3324bd7031c8229d
-
SSDEEP
96:IiqA7bDe2xHkR1C41EhvSE+6nNtMn0iGd8CqRLqtJ1trRhElfL:IiqA7/ZH0uQMtcfCqo/tdgf
Score5/10-
Drops file in System32 directory
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
00a0194c20ee912257df53bfe258ee4a
-
SHA1
d7b4e319bc5119024690dc8230b9cc919b1b86b2
-
SHA256
dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
-
SHA512
3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
SSDEEP
192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
ModiLoader First Stage
-
Warzone RAT payload
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/UserInfo.dll
-
Size
4KB
-
MD5
1e8e11f465afdabe97f529705786b368
-
SHA1
ea42bed65df6618c5f5648567d81f3935e70a2a0
-
SHA256
7d099352c82612ab27ddfd7310c1aa049b58128fb04ea6ea55816a40a6f6487b
-
SHA512
16566a8c1738e26962139aae893629098dc759e4ac87df3e8eb9819df4e0e422421836bb1e4240377e00fb2f4408ce40f40eee413d0f6dd2f3a4e27a52d49a0b
Score8/10-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
-
-
Target
$PLUGINSDIR/drvinst.exe
-
Size
188KB
-
MD5
dcec5b0cf19b0238ce934467c860ef5a
-
SHA1
50c192aeaabf36ca9c0022cdcfc95b409ee820ad
-
SHA256
bee3dc2cbff39c84b5a1d00535b20595b935bbcd2d8d24940def5a60a2adb7e6
-
SHA512
95edda9a2079284ab9733a4e1363876cb8fdf9f1697c2a1dcc250789e4677ab0e22ade4e26b62329b61f69ad652a92c0489691f28bc169a2890fe85a13d96183
-
SSDEEP
3072:Qq35e2JpY92rJpw9lnIXskke/rB94hOI3Yic5K62YQbrwVLnK+35CI:B35e2JpY9GEbnIXs294hOI39b623uX5n
Score1/10 -
-
-
Target
$PLUGINSDIR/loopbe1.sys
-
Size
13KB
-
MD5
37efb026e1a8a79fbe7044a241281b3e
-
SHA1
2338874e4b8e68d7752bbe92fe1b6df12d812551
-
SHA256
d2c20282d6e5dbff38c00df745f19f2457baf53cb5ee30c02979029fa04e0ddb
-
SHA512
53e4dadbe3b69cca3efa76f4da781f15d5624e5a22f269ba75af324e89aefe391243197197fd7b0510e3b56ea21a33875e5e18272e824f55e16cdd26b05370f1
-
SSDEEP
384:F0XJ7Tpbtqh4RbDEoiKdSSjGTENTMV9Kyue:i5btqCLiKdSSjOENT89p
Score1/10 -
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
e54eb27fb5048964e8d1ec7a1f72334b
-
SHA1
2b76d7aedafd724de96532b00fbc6c7c370e4609
-
SHA256
ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
-
SHA512
c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
SSDEEP
96:57GUb+YNfwgcr8zyKwZ5S4JxN8BS0ef9/3VI9d0qqyVgN532E:VKgfwgcr8zylsB49Ud0qJVgNQ
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
6Pre-OS Boot
1Bootkit
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1