Overview
overview
10Static
static
10shark_botnet_c2.zip
windows7-x64
7shark_botnet_c2.zip
windows10-2004-x64
1WinDivert.dll
windows7-x64
1WinDivert.dll
windows10-2004-x64
1WinDivert64.sys
windows7-x64
1WinDivert64.sys
windows10-2004-x64
1barrier.cpp
windows7-x64
3barrier.cpp
windows10-2004-x64
3desktop.ini
windows7-x64
1desktop.ini
windows10-2004-x64
1sharkbotnetc2.exe
windows7-x64
7sharkbotnetc2.exe
windows10-2004-x64
8���k�Yv.pyc
windows7-x64
���k�Yv.pyc
windows10-2004-x64
xmmintrin.h
windows7-x64
3xmmintrin.h
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 19:45
Behavioral task
behavioral1
Sample
shark_botnet_c2.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
shark_botnet_c2.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WinDivert.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
WinDivert.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
WinDivert64.sys
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
WinDivert64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
barrier.cpp
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
barrier.cpp
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
desktop.ini
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
desktop.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
sharkbotnetc2.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
sharkbotnetc2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
���k�Yv.pyc
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
���k�Yv.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
xmmintrin.h
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
xmmintrin.h
Resource
win10v2004-20241007-en
General
-
Target
xmmintrin.h
-
Size
106KB
-
MD5
04b4174745d9f46d48080aefb7d04c2c
-
SHA1
478f97abfaba53478b15648f4ed51b0f3f1a4799
-
SHA256
874f9651d758cfe659021e41794f8e8fede3cbe87caf7a997e58d38eef2b3af3
-
SHA512
169c8152de3eba1351250e4d08191ee6ead0587734d202aba42356a70d44889f55c1875a5e7e5d15287c7dc1e697db65f049b02702b2fc7ec47e50092aa586a9
-
SSDEEP
1536:CO0BIl1Fexvtw97q78Nhr9aNhr9QeatQr6qUqYHUqTwE4wxcdFNZFEngbNSKrbsK:mpJC0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2452 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2552 1564 cmd.exe 30 PID 1564 wrote to memory of 2552 1564 cmd.exe 30 PID 1564 wrote to memory of 2552 1564 cmd.exe 30 PID 2552 wrote to memory of 2452 2552 rundll32.exe 31 PID 2552 wrote to memory of 2452 2552 rundll32.exe 31 PID 2552 wrote to memory of 2452 2552 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xmmintrin.h1⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xmmintrin.h2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\xmmintrin.h3⤵
- Opens file in notepad (likely ransom note)
PID:2452
-
-