Overview
overview
10Static
static
10Nighty-Sel...in.zip
windows7-x64
1Nighty-Sel...in.zip
windows10-2004-x64
1Nighty-Sel...hty.py
windows7-x64
3Nighty-Sel...hty.py
windows10-2004-x64
3Nighty-Sel...DME.md
windows7-x64
3Nighty-Sel...DME.md
windows10-2004-x64
3Nighty-Sel...es.txt
windows7-x64
1Nighty-Sel...es.txt
windows10-2004-x64
1Nighty-Sel...on.ico
windows7-x64
3Nighty-Sel...on.ico
windows10-2004-x64
3Nighty-Sel...ll.bat
windows7-x64
1Nighty-Sel...ll.bat
windows10-2004-x64
1Nighty-Sel...ts.txt
windows7-x64
1Nighty-Sel...ts.txt
windows10-2004-x64
1Nighty-Sel...un.exe
windows7-x64
7Nighty-Sel...un.exe
windows10-2004-x64
9q����(.pyc
windows7-x64
q����(.pyc
windows10-2004-x64
Nighty-Sel...ed.mp3
windows7-x64
1Nighty-Sel...ed.mp3
windows10-2004-x64
6Nighty-Sel...or.mp3
windows7-x64
1Nighty-Sel...or.mp3
windows10-2004-x64
6Nighty-Sel...in.mp3
windows7-x64
1Nighty-Sel...in.mp3
windows10-2004-x64
6Nighty-Sel...on.mp3
windows7-x64
1Nighty-Sel...on.mp3
windows10-2004-x64
6Nighty-Sel...pt.exe
windows7-x64
1Nighty-Sel...pt.exe
windows10-2004-x64
1Nighty-Sel...ss.mp3
windows7-x64
1Nighty-Sel...ss.mp3
windows10-2004-x64
6Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 05:33
Behavioral task
behavioral1
Sample
Nighty-Selfbot-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Nighty-Selfbot-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Nighty-Selfbot-main/Nighty.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nighty-Selfbot-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Nighty-Selfbot-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Nighty-Selfbot-main/features.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Nighty-Selfbot-main/features.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Nighty-Selfbot-main/icon.ico
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Nighty-Selfbot-main/icon.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Nighty-Selfbot-main/install.bat
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Nighty-Selfbot-main/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Nighty-Selfbot-main/requirements.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Nighty-Selfbot-main/run.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Nighty-Selfbot-main/run.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
q����(.pyc
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
q����(.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Nighty-Selfbot-main/sounds/connected.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Nighty-Selfbot-main/sounds/error.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Nighty-Selfbot-main/sounds/giveaway-win.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Nighty-Selfbot-main/sounds/notification.mp3
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Nighty-Selfbot-main/sounds/run_script.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Nighty-Selfbot-main/sounds/success.mp3
Resource
win10v2004-20240802-en
General
-
Target
Nighty-Selfbot-main/sounds/notification.mp3
-
Size
26KB
-
MD5
6fa234f4fc5e44f0b18a51aa9095c956
-
SHA1
e1650f9f4294c883ba6282093e92c85a9329bd17
-
SHA256
a7584353e7229c14cdbf75409e9785205f2f95dd26609374e7ad1a2b83f1d9fc
-
SHA512
24c9e219c777a5bbb235476be8e04fb8b6662b6712755c38bce05ba626bb6b6f8d2c3d7addebfc34052e41f81386d945ce7af05387bf7c1f374689cfda3bc257
-
SSDEEP
768:K9bi28u6mkBQRc0icm9P4nII4+PZWKB8lwKtQ/+o5n53h:Ai1A0t4d4UZWKldT3h
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{E76E03EA-AAF1-4ECE-AC8E-29EA4D4218BE} wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 396 wmplayer.exe Token: SeCreatePagefilePrivilege 396 wmplayer.exe Token: SeShutdownPrivilege 4184 unregmp2.exe Token: SeCreatePagefilePrivilege 4184 unregmp2.exe Token: 33 2580 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2580 AUDIODG.EXE Token: SeShutdownPrivilege 396 wmplayer.exe Token: SeCreatePagefilePrivilege 396 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 396 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 396 wrote to memory of 4356 396 wmplayer.exe 87 PID 396 wrote to memory of 4356 396 wmplayer.exe 87 PID 396 wrote to memory of 4356 396 wmplayer.exe 87 PID 4356 wrote to memory of 4184 4356 unregmp2.exe 88 PID 4356 wrote to memory of 4184 4356 unregmp2.exe 88
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Nighty-Selfbot-main\sounds\notification.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x50c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5563088ad0f20fabf9dd62c6ba8ae1636
SHA1f9cd2fd153afa1a12ff990cf27c32b8c9c44e878
SHA256eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184
SHA5128229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092
-
Filesize
1024KB
MD5fdc0bc3b132971fc475f9c1606aed70b
SHA18f5aff8d57e9d49d9f7d7adcae484e99e5e213f8
SHA2564bfc6c72149eb309c77b5c488532014bdd23a2d3df2454f824657d1852b398cd
SHA512698323038802624effec60848f6e2da68fb6b20702763a9441d482f84161e67d284f27e250397ca8f9aabdd4a353bec853917c83a15143d2e25b49fbc3d5dcf3
-
Filesize
68KB
MD53980cdba7e64869759ab41f9e68283af
SHA1f0c55f32a6beb280bd515b6b470c13327ba2e1d3
SHA256ac49f68abd7b95446d5694e25d411ad4075da70948bf6c11ca9d7c9d5ded1f88
SHA51257ccedbb5389a6e41f8494ebff23db05ab24f0e84d5049e7e3274943b1962ec0fe1d4929765a78896f06c991d505341f87c72935a62105c96b1823f0ce6cd73b
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD56c7c9ba71636df8801cdd641d13844ce
SHA1993ac3d4dfc44d0af0fe8f543f10d65430680cdc
SHA256f34bc6f902e7eaa826a4f9cef2c3f68d842db8f476a55db45eb373168ed9a359
SHA512838932580c103a6726c42aae28b9f98d26f8d36a3e6bf07e8900d4c34a5c49f403aaeb3f79e7c3201e2c4d8e3a1b39c81ffc2bccc690c437a81ff1ec6e43413b