Resubmissions

24-08-2024 21:20

240824-z61jsazfne 7

24-08-2024 21:16

240824-z4evaszeje 7

Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 21:20

General

  • Target

    Pterodactyl Desktop.exe

  • Size

    129.8MB

  • MD5

    8d31a6ec3edf1f6bc88df0506368d63d

  • SHA1

    b9b924b1291e822723fffc98cb05d0710b7641cd

  • SHA256

    6c451ed78396efe6e4e1b0d997b82a7db2d3de81d6a26b51b43ec37f4088862c

  • SHA512

    5e3b2597fb0093b0de4e3d64c7024310c2b5a05ebaa7b07fbe9f7a6283decb978183c6554c4f8352c19e967f416e4f4feb23ecd630098de7ee9a655f498cbf0c

  • SSDEEP

    1572864:omYWQRWtJ65M7a2iu4Rywh9hJyO9N+oJOTU8f/kmgZ2sI:f4M7a2H4Ryu+dNgI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
    "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
      "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=gpu-process --field-trial-handle=952,9569640177063712249,15463694487363320722,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=964 /prefetch:2
      2⤵
        PID:1900
      • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=952,9569640177063712249,15463694487363320722,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1264 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2736
      • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=renderer --field-trial-handle=952,9569640177063712249,15463694487363320722,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1456 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:2728
      • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=gpu-process --field-trial-handle=952,9569640177063712249,15463694487363320722,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=964 /prefetch:2
        2⤵
          PID:2348
        • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
          "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=renderer --field-trial-handle=952,9569640177063712249,15463694487363320722,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-compositing --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1604 /prefetch:1
          2⤵
          • Checks computer location settings
          PID:2988

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Cache\f_000006

        Filesize

        212KB

        MD5

        2257803a7e34c3abd90ec6d41fd76a5a

        SHA1

        f7a32e6635d8513f74bd225f55d867ea56ae4803

        SHA256

        af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174

        SHA512

        e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540

      • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Code Cache\js\index-dir\the-real-index

        Filesize

        48B

        MD5

        00e10e5efaecb4e8352c726d44e47d69

        SHA1

        bb8ac00e5a6a7428d9b6b436502aae2b4dc52700

        SHA256

        a9c36d1022c1778638b7c7f530ef04903278edc480480f79b3500e10fb72dda6

        SHA512

        8f7eef5a7eeba03c8b332b20e51c2eb06badcf68e873c3871c05f05086a94e770d9e1dc42e349e007976521441c9d71bc1e8f025605514e46eb1d18346d9802e

      • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • memory/1900-33-0x00000000773D0000-0x00000000773D1000-memory.dmp

        Filesize

        4KB

      • memory/1900-1-0x0000000000060000-0x0000000000061000-memory.dmp

        Filesize

        4KB