Overview
overview
10Static
static
3B3RAP Leec...er.exe
windows7-x64
8B3RAP Leec...er.exe
windows10-2004-x64
7B3RAP Leec...et.dll
windows7-x64
1B3RAP Leec...et.dll
windows10-2004-x64
1NETFLIX Ch...ER.exe
windows7-x64
7NETFLIX Ch...ER.exe
windows10-2004-x64
7NETFLIX Ch...ER.exe
windows7-x64
7NETFLIX Ch...ER.exe
windows10-2004-x64
7NETFLIX Ch...er.dll
windows7-x64
1NETFLIX Ch...er.dll
windows10-2004-x64
1NETFLIX Ch...et.dll
windows7-x64
1NETFLIX Ch...et.dll
windows10-2004-x64
1Proxy Chec...ER.exe
windows7-x64
7Proxy Chec...ER.exe
windows10-2004-x64
7Proxy Chec...ER.exe
windows7-x64
8Proxy Chec...ER.exe
windows10-2004-x64
7Proxy Chec...ck.exe
windows7-x64
10Proxy Chec...ck.exe
windows10-2004-x64
10Proxy Chec...er.dll
windows7-x64
1Proxy Chec...er.dll
windows10-2004-x64
1Proxy Chec...et.dll
windows7-x64
1Proxy Chec...et.dll
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
B3RAP Leecher v0.5/B3RAP Leecher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
B3RAP Leecher v0.5/B3RAP Leecher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
B3RAP Leecher v0.5/Leaf.xNet.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
B3RAP Leecher v0.5/Leaf.xNet.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
NETFLIX Checker Account By X-KILLER/._cache_NETFLIX Checker Account By X-KILLER.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
NETFLIX Checker Account By X-KILLER/._cache_NETFLIX Checker Account By X-KILLER.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
NETFLIX Checker Account By X-KILLER/NETFLIX Checker Account By X-KILLER.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
NETFLIX Checker Account By X-KILLER/NETFLIX Checker Account By X-KILLER.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
NETFLIX Checker Account By X-KILLER/SkinSoft.VisualStyler.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
NETFLIX Checker Account By X-KILLER/SkinSoft.VisualStyler.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
NETFLIX Checker Account By X-KILLER/xNet.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
NETFLIX Checker Account By X-KILLER/xNet.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Proxy Checker v0.2/._cache_Proxy Checker v0.2 By X-SLAYER.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Proxy Checker v0.2/._cache_Proxy Checker v0.2 By X-SLAYER.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Proxy Checker v0.2/Proxy Checker v0.2 By X-SLAYER.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Proxy Checker v0.2/Proxy Checker v0.2 By X-SLAYER.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Proxy Checker v0.2/Proxy Checker v0.2 Crack.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Proxy Checker v0.2/Proxy Checker v0.2 Crack.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Proxy Checker v0.2/SkinSoft.VisualStyler.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Proxy Checker v0.2/SkinSoft.VisualStyler.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Proxy Checker v0.2/xNet.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Proxy Checker v0.2/xNet.dll
Resource
win10v2004-20240802-en
General
-
Target
Proxy Checker v0.2/Proxy Checker v0.2 By X-SLAYER.exe
-
Size
2.1MB
-
MD5
b472373d26e5446e44e11ee35803fb2c
-
SHA1
2f4d67d015fca0a3f7105d3fa7bfbbf48454dfe4
-
SHA256
fc897f290aab0e768822c3ee33e0b1ee2d15b6f23139f007299b26563efefc94
-
SHA512
41958196e899f325b4bea38696838eb6341246d7e6a1c311ec72dbf32dfc338c7e4f05e7fdd38b68d4f33c011867049c20cfbf625f36682219c3391b64062db4
-
SSDEEP
49152:wnsHyjtk2MYC5GD2T/t/GERDN+2VsjnAGERDi:wnsmtk2aaEv+2VUDEk
Malware Config
Signatures
-
resource behavioral15/files/0x000500000001904d-108.dat -
Executes dropped EXE 3 IoCs
pid Process 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2816 Synaptics.exe 2632 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 1980 Proxy Checker v0.2 By X-SLAYER.exe 1980 Proxy Checker v0.2 By X-SLAYER.exe 1980 Proxy Checker v0.2 By X-SLAYER.exe 2816 Synaptics.exe 2816 Synaptics.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Proxy Checker v0.2 By X-SLAYER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Proxy Checker v0.2 By X-SLAYER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 368 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 2632 ._cache_Synaptics.exe 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2632 ._cache_Synaptics.exe 2196 ._cache_Proxy Checker v0.2 By X-SLAYER.exe 368 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2196 1980 Proxy Checker v0.2 By X-SLAYER.exe 31 PID 1980 wrote to memory of 2196 1980 Proxy Checker v0.2 By X-SLAYER.exe 31 PID 1980 wrote to memory of 2196 1980 Proxy Checker v0.2 By X-SLAYER.exe 31 PID 1980 wrote to memory of 2196 1980 Proxy Checker v0.2 By X-SLAYER.exe 31 PID 1980 wrote to memory of 2816 1980 Proxy Checker v0.2 By X-SLAYER.exe 32 PID 1980 wrote to memory of 2816 1980 Proxy Checker v0.2 By X-SLAYER.exe 32 PID 1980 wrote to memory of 2816 1980 Proxy Checker v0.2 By X-SLAYER.exe 32 PID 1980 wrote to memory of 2816 1980 Proxy Checker v0.2 By X-SLAYER.exe 32 PID 2816 wrote to memory of 2632 2816 Synaptics.exe 33 PID 2816 wrote to memory of 2632 2816 Synaptics.exe 33 PID 2816 wrote to memory of 2632 2816 Synaptics.exe 33 PID 2816 wrote to memory of 2632 2816 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proxy Checker v0.2\Proxy Checker v0.2 By X-SLAYER.exe"C:\Users\Admin\AppData\Local\Temp\Proxy Checker v0.2\Proxy Checker v0.2 By X-SLAYER.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Proxy Checker v0.2\._cache_Proxy Checker v0.2 By X-SLAYER.exe"C:\Users\Admin\AppData\Local\Temp\Proxy Checker v0.2\._cache_Proxy Checker v0.2 By X-SLAYER.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Proxy Checker v0.2\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\Proxy Checker v0.2\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5b472373d26e5446e44e11ee35803fb2c
SHA12f4d67d015fca0a3f7105d3fa7bfbbf48454dfe4
SHA256fc897f290aab0e768822c3ee33e0b1ee2d15b6f23139f007299b26563efefc94
SHA51241958196e899f325b4bea38696838eb6341246d7e6a1c311ec72dbf32dfc338c7e4f05e7fdd38b68d4f33c011867049c20cfbf625f36682219c3391b64062db4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
23KB
MD5c95c6c679b92cc1b785a6f8a07a1c38f
SHA142d60a1fc40409fa2a971cdc6bb691a4dda4e8b3
SHA256ca69975ae96b51023bb4f36d1cfaf89e0e3e29979d2bd7919f1d0e6d1c0043a5
SHA512a66fbe4bef5f1507c9257671a38e37779a726ae241f62d794cbc0c68b33fb68b7f91b3ed3763a77ced7942c6279ea3b985710e9cf25af76996b6129c8c80f28f
-
Filesize
66KB
MD5c74d260d388f5ac3d95d8c1c3a27c989
SHA15da009086036004a7c670d608d5e1e923aead568
SHA256dc1bebb8ce88d59e4b3130c1ff2c4b7f5df2701c7a71b476b8a6f2ed541db628
SHA5126460db8f73806017d267c0e4e112902956a3bc53853c6a893cff66fe44772305b2c158ef8b58e993806d713aceaddcf2efa7ccf625063678444d3fd20b10546a
-
Filesize
1.4MB
MD56d0fc4a87660eb12e4748e3b38b26879
SHA1a780cc0f3feb7cdfb09051a18dd102b9ab111ff1
SHA2565d9a4b3353659a3e88b520ec6b2a9d461bcbf8866a37dde649a416f7532a30d4
SHA512a413451a621f8df7f7256ea96695459d3e7f4963863523329e483850fa94569ec97e247ba614aff7416c678e270c0dbe282bff18be0dac057176fc964178f903