Resubmissions

24/08/2024, 21:20

240824-z61jsazfne 7

24/08/2024, 21:16

240824-z4evaszeje 7

Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 21:20

General

  • Target

    Pterodactyl Desktop.exe

  • Size

    129.8MB

  • MD5

    8d31a6ec3edf1f6bc88df0506368d63d

  • SHA1

    b9b924b1291e822723fffc98cb05d0710b7641cd

  • SHA256

    6c451ed78396efe6e4e1b0d997b82a7db2d3de81d6a26b51b43ec37f4088862c

  • SHA512

    5e3b2597fb0093b0de4e3d64c7024310c2b5a05ebaa7b07fbe9f7a6283decb978183c6554c4f8352c19e967f416e4f4feb23ecd630098de7ee9a655f498cbf0c

  • SSDEEP

    1572864:omYWQRWtJ65M7a2iu4Rywh9hJyO9N+oJOTU8f/kmgZ2sI:f4M7a2H4Ryu+dNgI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
    "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
      "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=gpu-process --field-trial-handle=1636,4214610826446591743,14301374283038472512,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1644 /prefetch:2
      2⤵
        PID:448
      • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1636,4214610826446591743,14301374283038472512,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1352
      • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=renderer --field-trial-handle=1636,4214610826446591743,14301374283038472512,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2284 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:4616
      • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=renderer --field-trial-handle=1636,4214610826446591743,14301374283038472512,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
        2⤵
        • Checks computer location settings
        PID:3444
      • C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\Pterodactyl Desktop.exe" --type=gpu-process --field-trial-handle=1636,4214610826446591743,14301374283038472512,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1608 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4736
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:4612

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Cache\f_000005

              Filesize

              212KB

              MD5

              2257803a7e34c3abd90ec6d41fd76a5a

              SHA1

              f7a32e6635d8513f74bd225f55d867ea56ae4803

              SHA256

              af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174

              SHA512

              e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540

            • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Code Cache\js\index-dir\the-real-index

              Filesize

              48B

              MD5

              3246791076efa3b2bad3989f38394313

              SHA1

              59a9a5614e794107f362e181d7a7aaab70884fdd

              SHA256

              d27ca88de6ffc34923252e0e665005688d4b3e27a1340761b6db7e2feccbb394

              SHA512

              f2bb9d3da9f5913f726b0b8235899044162ec01f3871521f03d52926760f1fee8a240fb0746f174119f651ecbf4e002884425aed66ce92afe9aa762aa4fec5f2

            • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Code Cache\js\index-dir\the-real-index

              Filesize

              240B

              MD5

              517ddccc9d70bac1f2ae5ad804b4d183

              SHA1

              dba0aa976ba339c61335a444b47674aaa2e651e9

              SHA256

              5a161733a6156be7b4c328aa7ef38eda79636ffacfbb70eb5aac073d7a891bed

              SHA512

              ef7c9805d32578336778781ab3aea6395b56a7c993debdeb0e091e911fc5118617b7e511170f79d3f7bbe2279bc2506b5435858c4920b1bba769826ca1688859

            • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Network Persistent State

              Filesize

              1KB

              MD5

              5630ce155fffddd7564bca5d57de6a34

              SHA1

              851c8f8aa3703d30ff101fcdcfea54972a8826b5

              SHA256

              e3b4b3c600afe1e9631c81f9a74ebe37b9a06bb2d05fd6442dd4e95752362b79

              SHA512

              fd77187c47efa302e1c2c7bca3c767bcb624b594a5b8c643ba816c6446daeb3b9f106f786bbd6dbf66c879eb01c12cbbeac1cb70860df1557fb373e3f7bc910d

            • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Network Persistent State~RFe58dcaf.TMP

              Filesize

              59B

              MD5

              2800881c775077e1c4b6e06bf4676de4

              SHA1

              2873631068c8b3b9495638c865915be822442c8b

              SHA256

              226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

              SHA512

              e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

            • C:\Users\Admin\AppData\Roaming\pterodactyl-desktop\Session Storage\CURRENT

              Filesize

              16B

              MD5

              46295cac801e5d4857d09837238a6394

              SHA1

              44e0fa1b517dbf802b18faf0785eeea6ac51594b

              SHA256

              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

              SHA512

              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

            • memory/448-9-0x00007FF8A69D0000-0x00007FF8A69D1000-memory.dmp

              Filesize

              4KB

            • memory/3444-66-0x00007FF8A6310000-0x00007FF8A6311000-memory.dmp

              Filesize

              4KB

            • memory/3444-101-0x000001EEC8070000-0x000001EEC811C000-memory.dmp

              Filesize

              688KB

            • memory/3444-117-0x000001EEC79D0000-0x000001EEC7A6E000-memory.dmp

              Filesize

              632KB

            • memory/3444-118-0x000001EEC8070000-0x000001EEC811C000-memory.dmp

              Filesize

              688KB

            • memory/3444-100-0x000001EEC79D0000-0x000001EEC7A6E000-memory.dmp

              Filesize

              632KB

            • memory/3444-67-0x00007FF8A6C40000-0x00007FF8A6C41000-memory.dmp

              Filesize

              4KB

            • memory/3444-142-0x000001EEC79D0000-0x000001EEC7A6E000-memory.dmp

              Filesize

              632KB