Overview
overview
7Static
static
3Five.Night....2.zip
windows7-x64
1Five.Night....2.zip
windows10-2004-x64
1Five.Night...s2.exe
windows7-x64
7Five.Night...s2.exe
windows10-2004-x64
7Five.Night...ll.bat
windows7-x64
7Five.Night...ll.bat
windows10-2004-x64
7Five.Night...64.exe
windows7-x64
7Five.Night...64.exe
windows10-2004-x64
7Five.Night...86.exe
windows7-x64
7Five.Night...86.exe
windows10-2004-x64
7Five.Night...64.exe
windows7-x64
7Five.Night...64.exe
windows10-2004-x64
7Five.Night...86.exe
windows7-x64
Five.Night...86.exe
windows10-2004-x64
Five.Night...64.exe
windows7-x64
7Five.Night...64.exe
windows10-2004-x64
7Five.Night...86.exe
windows7-x64
7Five.Night...86.exe
windows10-2004-x64
7Five.Night...64.exe
windows7-x64
7Five.Night...64.exe
windows10-2004-x64
7Five.Night...86.exe
windows7-x64
7Five.Night...86.exe
windows10-2004-x64
7Five.Night...64.exe
windows7-x64
7Five.Night...64.exe
windows10-2004-x64
7Five.Night...86.exe
windows7-x64
7Five.Night...86.exe
windows10-2004-x64
7Five.Night...64.exe
windows7-x64
7Five.Night...64.exe
windows10-2004-x64
7Five.Night...86.exe
windows7-x64
7Five.Night...86.exe
windows10-2004-x64
7Analysis
-
max time kernel
17s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
Five.Nights.at.Freddys.2.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Five.Nights.at.Freddys.2.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Five.Nights.at.Freddys.2/Five.Nights.at.Freddys.2/FiveNightsatFreddys2.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Five.Nights.at.Freddys.2/Five.Nights.at.Freddys.2/FiveNightsatFreddys2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Five.Nights.at.Freddys.2/_Redist/install_all.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Five.Nights.at.Freddys.2/_Redist/install_all.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2005_x64.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2005_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2005_x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2005_x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2008_x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2008_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2008_x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2008_x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2010_x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2010_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2010_x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2010_x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2012_x64.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2012_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2012_x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2012_x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2013_x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2013_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2013_x86.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2013_x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2015_2017_2019_x64.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2015_2017_2019_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2015_2017_2019_x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Five.Nights.at.Freddys.2/_Redist/vcredist2015_2017_2019_x86.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Five.Nights.at.Freddys.2/_Redist/vcredist2008_x86.exe
-
Size
4.3MB
-
MD5
35da2bf2befd998980a495b6f4f55e60
-
SHA1
470640aa4bb7db8e69196b5edb0010933569e98d
-
SHA256
6b3e4c51c6c0e5f68c8a72b497445af3dbf976394cbb62aa23569065c28deeb6
-
SHA512
bf630667c87b8f10ef85b61f2f379d7ce24124618b999babfec8e2df424eb494b8f1bf0977580810dff5124d4dbdec9539ff53e0dc14625c076fa34dfe44e3f2
-
SSDEEP
98304:vT4tlQ0aeY51XNURYxaA6qjEb9tRuPmBmWBDLTMTtbslyzRt9cuISY6Qa:vKlhE9U6476itR+mLPw6lyZY61
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
install.exepid process 2908 install.exe -
Loads dropped DLL 2 IoCs
Processes:
vcredist2008_x86.exeinstall.exepid process 2408 vcredist2008_x86.exe 2908 install.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe -
Drops file in Windows directory 4 IoCs
Processes:
msiexec.exedescription ioc process File created \??\c:\Windows\Installer\f7704f2.ipi msiexec.exe File opened for modification \??\c:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI13EE.tmp msiexec.exe File opened for modification \??\c:\Windows\Installer\f7704f2.ipi msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vcredist2008_x86.exeinstall.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2008_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 2884 msiexec.exe 2884 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
install.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 2908 install.exe Token: SeIncreaseQuotaPrivilege 2908 install.exe Token: SeRestorePrivilege 2884 msiexec.exe Token: SeTakeOwnershipPrivilege 2884 msiexec.exe Token: SeSecurityPrivilege 2884 msiexec.exe Token: SeCreateTokenPrivilege 2908 install.exe Token: SeAssignPrimaryTokenPrivilege 2908 install.exe Token: SeLockMemoryPrivilege 2908 install.exe Token: SeIncreaseQuotaPrivilege 2908 install.exe Token: SeMachineAccountPrivilege 2908 install.exe Token: SeTcbPrivilege 2908 install.exe Token: SeSecurityPrivilege 2908 install.exe Token: SeTakeOwnershipPrivilege 2908 install.exe Token: SeLoadDriverPrivilege 2908 install.exe Token: SeSystemProfilePrivilege 2908 install.exe Token: SeSystemtimePrivilege 2908 install.exe Token: SeProfSingleProcessPrivilege 2908 install.exe Token: SeIncBasePriorityPrivilege 2908 install.exe Token: SeCreatePagefilePrivilege 2908 install.exe Token: SeCreatePermanentPrivilege 2908 install.exe Token: SeBackupPrivilege 2908 install.exe Token: SeRestorePrivilege 2908 install.exe Token: SeShutdownPrivilege 2908 install.exe Token: SeDebugPrivilege 2908 install.exe Token: SeAuditPrivilege 2908 install.exe Token: SeSystemEnvironmentPrivilege 2908 install.exe Token: SeChangeNotifyPrivilege 2908 install.exe Token: SeRemoteShutdownPrivilege 2908 install.exe Token: SeUndockPrivilege 2908 install.exe Token: SeSyncAgentPrivilege 2908 install.exe Token: SeEnableDelegationPrivilege 2908 install.exe Token: SeManageVolumePrivilege 2908 install.exe Token: SeImpersonatePrivilege 2908 install.exe Token: SeCreateGlobalPrivilege 2908 install.exe Token: SeRestorePrivilege 2884 msiexec.exe Token: SeTakeOwnershipPrivilege 2884 msiexec.exe Token: SeShutdownPrivilege 2908 install.exe Token: SeRestorePrivilege 2884 msiexec.exe Token: SeTakeOwnershipPrivilege 2884 msiexec.exe Token: SeRestorePrivilege 2884 msiexec.exe Token: SeTakeOwnershipPrivilege 2884 msiexec.exe Token: SeRestorePrivilege 2884 msiexec.exe Token: SeTakeOwnershipPrivilege 2884 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
vcredist2008_x86.exedescription pid process target process PID 2408 wrote to memory of 2908 2408 vcredist2008_x86.exe install.exe PID 2408 wrote to memory of 2908 2408 vcredist2008_x86.exe install.exe PID 2408 wrote to memory of 2908 2408 vcredist2008_x86.exe install.exe PID 2408 wrote to memory of 2908 2408 vcredist2008_x86.exe install.exe PID 2408 wrote to memory of 2908 2408 vcredist2008_x86.exe install.exe PID 2408 wrote to memory of 2908 2408 vcredist2008_x86.exe install.exe PID 2408 wrote to memory of 2908 2408 vcredist2008_x86.exe install.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Five.Nights.at.Freddys.2\_Redist\vcredist2008_x86.exe"C:\Users\Admin\AppData\Local\Temp\Five.Nights.at.Freddys.2\_Redist\vcredist2008_x86.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\bb4ec478838d6fee0ce4b6d4\install.exec:\bb4ec478838d6fee0ce4b6d4\.\install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2864
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fcf8c03cc02bdcf757c232c6f951964
SHA1ef1fe24b5ad14b80c6cf5d602aa324171292b878
SHA2566bb6d784a21a953873a8ec53f765f2fc6a72e352e0c29d5439108179b81b2b5b
SHA512015c877491089c341242d12f5d9f839e35e921bcc8c5b1ec182fd6f1e73b2e3e578cbb862d6f1aa2ab402de9f81b3d4984fee1cb0ccc7ab2335e274237246e3d
-
Filesize
1KB
MD50a6b586fabd072bd7382b5e24194eac7
SHA160e3c7215c1a40fbfb3016d52c2de44592f8ca95
SHA2567912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951
SHA512b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4
-
Filesize
841B
MD5f8f6c0e030cb622f065fe47d61da91d7
SHA1cf6fa99747de8f35c6aea52df234c9c57583baa3
SHA256c16727881c47a40077dc5a1f1ea71cbb28e3f4e156c0ae7074c6d7f5ecece21d
SHA512b70c6d67dac5e6a0dbd17e3bcf570a95914482abad20d0304c02da22231070b4bc887720dbae972bc5066457e1273b68fde0805f1c1791e9466a5ca343485cde
-
Filesize
85KB
MD5ff6003014eefc9c30abe20e3e1f5fbe8
SHA14a5bd05f94545f01efc10232385b8fecad300678
SHA256a522c5ea3250cdd538a9ce7b4a06dfd5123e7eb05eef67509f2b975a8e1d3067
SHA5123adc5c705bab7fa7b50517a5eb3301491f5150b56e1088ed436590458e963da204cd1875af75db89742403476a56a94c3f425c05327767bdb4bbee4859667ac2
-
Filesize
222KB
MD57e641e6a0b456271745c20c3bb8a18f9
SHA1ae6cedcb81dc443611a310140ae4671789dbbf3a
SHA25634c5e7d7ea270ee67f92d34843d89603d6d3b6d9ef5247b43ae3c59c909d380d
SHA512f67d6bf69d094edcc93541332f31b326131ff89672edb30fd349def6952ad8bfd07dc2f0ca5967b48a7589eee5b7a14b9a2c1ebe0cba4ae2324f7957090ea903
-
Filesize
5KB
MD506fba95313f26e300917c6cea4480890
SHA131beee44776f114078fc403e405eaa5936c4bc3b
SHA256594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1
SHA5127dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd
-
Filesize
547KB
MD54138c31964fbcb3b7418e086933324c3
SHA197cc6f58fb064ab6c4a2f02fb665fef77d30532f
SHA256b72056fc3df6f46069294c243fe5006879bf4a9d8eef388369a590ca41745f29
SHA51240cf2f35c3a944fca93d58d66465f0308197f5485381ff07d3065e0f59e94fc3834313068e4e5e5da395413ff2d3d1c3ff6fa050f2256e118972bf21a5643557