Overview
overview
10Static
static
10Nighty-Sel...in.zip
windows7-x64
1Nighty-Sel...in.zip
windows10-2004-x64
1Nighty-Sel...hty.py
windows7-x64
3Nighty-Sel...hty.py
windows10-2004-x64
3Nighty-Sel...DME.md
windows7-x64
3Nighty-Sel...DME.md
windows10-2004-x64
3Nighty-Sel...es.txt
windows7-x64
1Nighty-Sel...es.txt
windows10-2004-x64
1Nighty-Sel...on.ico
windows7-x64
3Nighty-Sel...on.ico
windows10-2004-x64
3Nighty-Sel...ll.bat
windows7-x64
1Nighty-Sel...ll.bat
windows10-2004-x64
1Nighty-Sel...ts.txt
windows7-x64
1Nighty-Sel...ts.txt
windows10-2004-x64
1Nighty-Sel...un.exe
windows7-x64
7Nighty-Sel...un.exe
windows10-2004-x64
9q����(.pyc
windows7-x64
q����(.pyc
windows10-2004-x64
Nighty-Sel...ed.mp3
windows7-x64
1Nighty-Sel...ed.mp3
windows10-2004-x64
6Nighty-Sel...or.mp3
windows7-x64
1Nighty-Sel...or.mp3
windows10-2004-x64
6Nighty-Sel...in.mp3
windows7-x64
1Nighty-Sel...in.mp3
windows10-2004-x64
6Nighty-Sel...on.mp3
windows7-x64
1Nighty-Sel...on.mp3
windows10-2004-x64
6Nighty-Sel...pt.exe
windows7-x64
1Nighty-Sel...pt.exe
windows10-2004-x64
1Nighty-Sel...ss.mp3
windows7-x64
1Nighty-Sel...ss.mp3
windows10-2004-x64
6Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 05:33
Behavioral task
behavioral1
Sample
Nighty-Selfbot-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Nighty-Selfbot-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nighty-Selfbot-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Nighty-Selfbot-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Nighty-Selfbot-main/features.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Nighty-Selfbot-main/features.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Nighty-Selfbot-main/icon.ico
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Nighty-Selfbot-main/icon.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Nighty-Selfbot-main/install.bat
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Nighty-Selfbot-main/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Nighty-Selfbot-main/run.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Nighty-Selfbot-main/run.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
q����(.pyc
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
q����(.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win10v2004-20240802-en
General
-
Target
Nighty-Selfbot-main/sounds/giveaway-win.mp3
-
Size
18KB
-
MD5
ee2a01ed560817800943d5974db997a0
-
SHA1
3060561905648271f15aec275e56db0a7ef9334d
-
SHA256
168c418ca2e1c3ea9543e3fa6f1656359d735c8c1ea62c9a96227b87d0237beb
-
SHA512
8f657c21677cb2fc41d05900f29a7c0f0fcfc9500d70d5db4dbb14a9659d603a6db659bad20e5005d476226bdb167a57678c37adc3fb5b4e0fc4186af889bcf0
-
SSDEEP
384:Vo9XzqPoyGmhlsYhQfB8OsEYaZfKSo5oEVQCz4/5Y7n0DZzl:VolG9dhlskE3CT61OOYjaZJ
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{5867FBF8-E486-4020-AB09-C5A7816A68C5} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 644 wmplayer.exe Token: SeCreatePagefilePrivilege 644 wmplayer.exe Token: SeShutdownPrivilege 2088 unregmp2.exe Token: SeCreatePagefilePrivilege 2088 unregmp2.exe Token: 33 1228 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1228 AUDIODG.EXE Token: SeShutdownPrivilege 644 wmplayer.exe Token: SeCreatePagefilePrivilege 644 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 644 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 644 wrote to memory of 4880 644 wmplayer.exe 94 PID 644 wrote to memory of 4880 644 wmplayer.exe 94 PID 644 wrote to memory of 4880 644 wmplayer.exe 94 PID 4880 wrote to memory of 2088 4880 unregmp2.exe 95 PID 4880 wrote to memory of 2088 4880 unregmp2.exe 95
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nighty-Selfbot-main\sounds\giveaway-win.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3416
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f4 0x4681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4392,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:81⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5a9582cb9912fd847e8bbcba947ce4987
SHA1c05ee133c580bd97ad8c050b8b3a8f3fbd9b7566
SHA2569d6d60adb6cbafe9d3e0af91ccfe8bae7f105db861763292ba777c3684056465
SHA5125cb7dce29e9802d86f78843aec0907da4ed704989d3a1a507e5424c9386ebfc6f27115399cd9d12e8738e647099ab03b4e281065dba98d2e06100aeb34ab35cf
-
Filesize
1024KB
MD5e195db7c33e052a65c5c8f1b120b5028
SHA1bcf389f132267d8a9d652e9e8dc7f81f88e6e937
SHA25619d9679555692d499bea96eac99ed51c57db919937e2e3bdb13a8fd451edf6ce
SHA512a3669c21f30d6cb1d7479fb03248f183fc910ecf55d627cea6c079efec41e7544cc71d1129251bed34edebc6d34f4665e463164d9805a0a8cc9a0879714f2c4b
-
Filesize
68KB
MD5e7bc8fa0ce459817e5a32f1645a150d9
SHA1cf7c06c48bf0dc9d4bce1f978d5c418e3c6f700e
SHA2561d8816f33ca16f0101f8371402e700380e42a987d25471e873d7f2fcfdbd0803
SHA5123506a7607b91415eb40d0dc5559e5ec9da783980360892ac44652d6d54da214a6ebd0a22d2628c8180bad47c20f83287ec12c3900657f2cf3381901a4f2d807a
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5dc8aa982737a9daba18e810f90969772
SHA10a9792b2a96cbc2fd60fbdf1f9f2ef7026c24e38
SHA256b036efc159e7ec3c9507f8c052a37470c5f0c9dd30d2d8ae205ecb6ec4a550b4
SHA512a728a6472080c4467504442537b2fb5e2ad73b0422fa218d522f64b6b4de45173ec03715e130250d1d4a65a3279da9c782a91c3da78ac1f567f41b8a831526aa