Overview
overview
10Static
static
10Nighty-Sel...in.zip
windows7-x64
1Nighty-Sel...in.zip
windows10-2004-x64
1Nighty-Sel...hty.py
windows7-x64
3Nighty-Sel...hty.py
windows10-2004-x64
3Nighty-Sel...DME.md
windows7-x64
3Nighty-Sel...DME.md
windows10-2004-x64
3Nighty-Sel...es.txt
windows7-x64
1Nighty-Sel...es.txt
windows10-2004-x64
1Nighty-Sel...on.ico
windows7-x64
3Nighty-Sel...on.ico
windows10-2004-x64
3Nighty-Sel...ll.bat
windows7-x64
1Nighty-Sel...ll.bat
windows10-2004-x64
1Nighty-Sel...ts.txt
windows7-x64
1Nighty-Sel...ts.txt
windows10-2004-x64
1Nighty-Sel...un.exe
windows7-x64
7Nighty-Sel...un.exe
windows10-2004-x64
9q����(.pyc
windows7-x64
q����(.pyc
windows10-2004-x64
Nighty-Sel...ed.mp3
windows7-x64
1Nighty-Sel...ed.mp3
windows10-2004-x64
6Nighty-Sel...or.mp3
windows7-x64
1Nighty-Sel...or.mp3
windows10-2004-x64
6Nighty-Sel...in.mp3
windows7-x64
1Nighty-Sel...in.mp3
windows10-2004-x64
6Nighty-Sel...on.mp3
windows7-x64
1Nighty-Sel...on.mp3
windows10-2004-x64
6Nighty-Sel...pt.exe
windows7-x64
1Nighty-Sel...pt.exe
windows10-2004-x64
1Nighty-Sel...ss.mp3
windows7-x64
1Nighty-Sel...ss.mp3
windows10-2004-x64
6Analysis
-
max time kernel
127s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 05:33
Behavioral task
behavioral1
Sample
Nighty-Selfbot-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Nighty-Selfbot-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nighty-Selfbot-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Nighty-Selfbot-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Nighty-Selfbot-main/features.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Nighty-Selfbot-main/features.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Nighty-Selfbot-main/icon.ico
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Nighty-Selfbot-main/icon.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Nighty-Selfbot-main/install.bat
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Nighty-Selfbot-main/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Nighty-Selfbot-main/run.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Nighty-Selfbot-main/run.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
q����(.pyc
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
q����(.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win10v2004-20240802-en
General
-
Target
Nighty-Selfbot-main/sounds/connected.mp3
-
Size
39KB
-
MD5
bac040adc17d6535af717d4f9a2c1011
-
SHA1
783df4816ff7da34b0261a07f810ec0dc4427d0e
-
SHA256
e36310f81ab1fad6c0109d9bb45680e7b7ec34e6196db72c4fe20e525fbcf9b7
-
SHA512
224a4aa6445537a7db3fb175bfd0ab3ad7c7ca10c9fa5457558a90ddc9f48eefbb81bf3e74a0c25c2b85aa2b3a47ea3eb6e4eb3116bcf038c9ee60d60215fe0e
-
SSDEEP
768:IjVo0yDfY+vWeU97VmtrW+I3L+HMej8P/LWksP7GGMJRzR3M7oL3aBfM:IwDfYh9Bar93MPKRSJXVH7apM
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2718105630-359604950-2820636825-1000\{4C6751C3-87EE-4409-B943-34CC2FCDE683} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2460 unregmp2.exe Token: SeCreatePagefilePrivilege 2460 unregmp2.exe Token: SeShutdownPrivilege 2472 wmplayer.exe Token: SeCreatePagefilePrivilege 2472 wmplayer.exe Token: 33 4492 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4492 AUDIODG.EXE Token: SeShutdownPrivilege 2472 wmplayer.exe Token: SeCreatePagefilePrivilege 2472 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2188 2472 wmplayer.exe 89 PID 2472 wrote to memory of 2188 2472 wmplayer.exe 89 PID 2472 wrote to memory of 2188 2472 wmplayer.exe 89 PID 2188 wrote to memory of 2460 2188 unregmp2.exe 90 PID 2188 wrote to memory of 2460 2188 unregmp2.exe 90
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nighty-Selfbot-main\sounds\connected.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3648
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x314 0x2d01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5563088ad0f20fabf9dd62c6ba8ae1636
SHA1f9cd2fd153afa1a12ff990cf27c32b8c9c44e878
SHA256eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184
SHA5128229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092
-
Filesize
1024KB
MD564cc51bf43ea8ee1d7c3b8ddfdca4cff
SHA1e8c04e907352ac0e1708c81063a71db945ac203f
SHA2561145774a295b117bcbead1e6fb664fef452a44ce9eb23fa029b71b72afc01a48
SHA51209d7f5264393e3604806ab5d9cd032cb4c8d984c769272b72ec969bc038da89c7f436b9b401bf84c0f2c4c62d050053b92b2eb7835dbecd951bd74ee017283a9
-
Filesize
68KB
MD5895473fab659b2eac1b575c89a4f051a
SHA1ee10ed3d11c53d62d2e7bf3f558a50811638e40a
SHA2563608904d6ba7343350ec75fd65d2a0ed4c1c00f99ebae1daef87a5f6457e2c83
SHA512b55d71c8cf8e801a1f62a4a04a212a286eae2b7ff92fd771c6916d379253614e71a85a0941a9b5a404a5ce484c41fb19bc169587326c0b07bf68915ea99bfbc0
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD54970a8883235cdac9937dfe2a086f9e3
SHA1145441c14810a3fb0d0bc25c227101bd34e0e9f1
SHA256318b8adfec829fa1e8d793f11fc3746169269efef68033101bb1f57c0933a99d
SHA512b6016e79ca37e02d3a833291318c23d3b52774ee9ae83ed0317b835a135d0ac0a7ed745576f5f3206667b5caa6645c02ed16d4e571581ee5250668587534fe5c