Overview
overview
7Static
static
7Source/MainWindow.exe
windows7-x64
3Source/MainWindow.exe
windows10-2004-x64
3Source/Mai...ow.exe
windows7-x64
3Source/Mai...ow.exe
windows10-2004-x64
3Source/Spo...ck.cmd
windows7-x64
1Source/Spo...ck.cmd
windows10-2004-x64
1Source/Spo...ck.exe
windows7-x64
7Source/Spo...ck.exe
windows10-2004-x64
7Source/bobspeak.vbs
windows7-x64
3Source/bobspeak.vbs
windows10-2004-x64
1Source/mover.exe
windows7-x64
5Source/mover.exe
windows10-2004-x64
5SpongebobFuck.exe
windows7-x64
7SpongebobFuck.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 01:10
Behavioral task
behavioral1
Sample
Source/MainWindow.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Source/MainWindow.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Source/MainWindow/MainWindow.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Source/MainWindow/MainWindow.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Source/SpongebobFuck.cmd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Source/SpongebobFuck.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Source/SpongebobFuck.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Source/SpongebobFuck.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Source/bobspeak.vbs
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Source/bobspeak.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Source/mover.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Source/mover.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
SpongebobFuck.exe
Resource
win7-20240903-en
General
-
Target
Source/SpongebobFuck.exe
-
Size
2.3MB
-
MD5
ff4a17c39d21c1142b374bb10958eb26
-
SHA1
16ffa640cdc8c5d379d3d0f1ea99b8ae3f37013e
-
SHA256
2d6a69e59a296086964f4f1b54a6ec0f63c804754839996735f0dce4cdd853f2
-
SHA512
172b9fbd373b039c2c99314804676f87d7526d8d59bcf8314351502350002cdd104f3ba492536651f834df5b90c28abec5ff972cf49bac34013649e0779fa8e1
-
SSDEEP
49152:Rti/NQprhknubdpvBZNLs67pOCAayKQydrZebinz9KMxjfjzgdFHPN:S/6prh7fBZN4AICvyKnubinzthfjzgXv
Malware Config
Signatures
-
resource yara_rule behavioral7/memory/2368-0-0x0000000000400000-0x00000000007BF000-memory.dmp upx behavioral7/memory/2368-18-0x0000000000400000-0x00000000007BF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpongebobFuck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3000 2368 SpongebobFuck.exe 31 PID 2368 wrote to memory of 3000 2368 SpongebobFuck.exe 31 PID 2368 wrote to memory of 3000 2368 SpongebobFuck.exe 31 PID 2368 wrote to memory of 3000 2368 SpongebobFuck.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Source\SpongebobFuck.exe"C:\Users\Admin\AppData\Local\Temp\Source\SpongebobFuck.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\C561.tmp\SpongebobFuck.cmd""2⤵
- System Location Discovery: System Language Discovery
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57a918ed93f7fb297e05464edccc46756
SHA19464288fed7ba5d88928265882def5e05ffbe7db
SHA25682fcb47b437dc1bedb77648755770b7cd9a29342fd2ab972c8bd063968d04604
SHA512cb70d6023b4bf23f35646e399c4ca7f0ab11ebf0a1e44cf0627afaa4025676c2a20ab82ffa28ed4a196dc8cf56b33b104bf457cf21d750a163955927dcba3cb1