Overview
overview
10Static
static
10Nighty-Sel...in.zip
windows7-x64
1Nighty-Sel...in.zip
windows10-2004-x64
1Nighty-Sel...hty.py
windows7-x64
3Nighty-Sel...hty.py
windows10-2004-x64
3Nighty-Sel...DME.md
windows7-x64
3Nighty-Sel...DME.md
windows10-2004-x64
3Nighty-Sel...es.txt
windows7-x64
1Nighty-Sel...es.txt
windows10-2004-x64
1Nighty-Sel...on.ico
windows7-x64
3Nighty-Sel...on.ico
windows10-2004-x64
3Nighty-Sel...ll.bat
windows7-x64
1Nighty-Sel...ll.bat
windows10-2004-x64
1Nighty-Sel...ts.txt
windows7-x64
1Nighty-Sel...ts.txt
windows10-2004-x64
1Nighty-Sel...un.exe
windows7-x64
7Nighty-Sel...un.exe
windows10-2004-x64
9q����(.pyc
windows7-x64
q����(.pyc
windows10-2004-x64
Nighty-Sel...ed.mp3
windows7-x64
1Nighty-Sel...ed.mp3
windows10-2004-x64
6Nighty-Sel...or.mp3
windows7-x64
1Nighty-Sel...or.mp3
windows10-2004-x64
6Nighty-Sel...in.mp3
windows7-x64
1Nighty-Sel...in.mp3
windows10-2004-x64
6Nighty-Sel...on.mp3
windows7-x64
1Nighty-Sel...on.mp3
windows10-2004-x64
6Nighty-Sel...pt.exe
windows7-x64
1Nighty-Sel...pt.exe
windows10-2004-x64
1Nighty-Sel...ss.mp3
windows7-x64
1Nighty-Sel...ss.mp3
windows10-2004-x64
6Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 05:33
Behavioral task
behavioral1
Sample
Nighty-Selfbot-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Nighty-Selfbot-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nighty-Selfbot-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Nighty-Selfbot-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Nighty-Selfbot-main/features.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Nighty-Selfbot-main/features.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Nighty-Selfbot-main/icon.ico
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Nighty-Selfbot-main/icon.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Nighty-Selfbot-main/install.bat
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Nighty-Selfbot-main/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Nighty-Selfbot-main/run.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Nighty-Selfbot-main/run.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
q����(.pyc
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
q����(.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win10v2004-20240802-en
General
-
Target
Nighty-Selfbot-main/sounds/error.mp3
-
Size
18KB
-
MD5
1e8f77eeaefcc75a118100ec8bdfb250
-
SHA1
ca8a7d35f87de220320d0c7d29bd500a42b128f4
-
SHA256
21efd0cc33d0bd16b9ec60795dd6770a125602b50670b7083a0ccf93cd470201
-
SHA512
717fedf9f05141cd638b045984b857599772be8fe9ebf1d1239bb25f7891b2239e759dda028cc870bb10d0223f4da35e779e05dde904727c4ec2e5dc18266eb6
-
SSDEEP
384:actkxr79DnSSD4fbPV+tPmuZGYH7/lpzLEAN+Vk0:arr79DSRPAYuZ3Hd+V/
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-786284298-625481688-3210388970-1000\{F2FF4578-9538-4C32-98AE-B6FB55156ED8} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 976 wmplayer.exe Token: SeCreatePagefilePrivilege 976 wmplayer.exe Token: SeShutdownPrivilege 2640 unregmp2.exe Token: SeCreatePagefilePrivilege 2640 unregmp2.exe Token: 33 4036 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4036 AUDIODG.EXE Token: SeShutdownPrivilege 976 wmplayer.exe Token: SeCreatePagefilePrivilege 976 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 976 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 976 wrote to memory of 3252 976 wmplayer.exe 87 PID 976 wrote to memory of 3252 976 wmplayer.exe 87 PID 976 wrote to memory of 3252 976 wmplayer.exe 87 PID 3252 wrote to memory of 2640 3252 unregmp2.exe 88 PID 3252 wrote to memory of 2640 3252 unregmp2.exe 88
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nighty-Selfbot-main\sounds\error.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1576
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3cc 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD512eb87b4dd9bb18dae0d5978f387425e
SHA169bf07f8091d93d507599b899ae0064e7f5be475
SHA256ce729ac3490c973b51f17bdd89b7bc44b9856b94fccccd1a9a3bff8685044fa0
SHA512e5c9378373f00cbe442a0691a763eb109cb9080409f19746d968e10f1bd9b69a64506d5ad8a33825dee87763c307a72d174e6e34c18c8da5e41a20d163b754ad
-
Filesize
1024KB
MD51aad3f868170daf88683562166248c3b
SHA1878c854128dc02c2461cc3d8a9ca3251a3d169d6
SHA256416bba3981ccfc55732b82eaf6496e89f7f7b2e746a632cd0cf9fae83860e16a
SHA512a58259d07060d39b1d314537faa3825104e6f246c00be04227bfe5bf38b05a6351914fc176a9656bb1d6776409a08630419adab5662a15c0fe1a2b73dae2bcbd
-
Filesize
68KB
MD58912e80432829162a0d19ba6fa601e3c
SHA11a045ff94a2153d94dd3d1114130abec2eea7ced
SHA256089a83e8c88c4e1b4bbcd7cb45999ad6a5357b8a32da605ddfded17070dad4eb
SHA5129bcd4fc4866ff88fa273fa006ce7b28ce83d6dc08d2137dbe50816ac92b2f62838803bc181acb63de2581ca01c04de19dad779d9797769367e552966d34e4f07
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5670282534a42a7701dcbec2f9ff5970f
SHA1f8bd5712d6548ff9c6b3822fdb139355b3e058bf
SHA2569bceabde0b1898ed11bc7d81434408d2cf41745df7ed51e8d51771f52948a088
SHA5129a9b257d09c22dc61e202a8a6699bfc49bd8e5d300f27c0ed905a62b826a50765da097ad7a1c0c91d40c0adb835539156f4626af6a9381fd4787b98391a307f5