Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/11/2024, 05:16

General

  • Target

    Beta wolf multi tool.exe

  • Size

    157KB

  • MD5

    86304bd184c7260044fedd5466fc202a

  • SHA1

    c795f461ab47f15968b013fa6acfae0c19fafdac

  • SHA256

    3dd251ad68b127cbbb2457425a53637983effc91f7d1ce869ac8e531933fdfeb

  • SHA512

    3de9dcacac7dd097f35c736004a37b8c649d1d89c5ead01e7a17e175670936acd16349384714fd211c6c3bcd93b93aaa1e52b289beccbc906aa726e8ced92c0c

  • SSDEEP

    3072:dahKyd2n31u5GWp1icKAArDZz4N9GhbkrNEk1bT:dahOSp0yN90QE8

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 16 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 4 IoCs
  • Runs ping.exe 1 TTPs 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Beta wolf multi tool.exe
    "C:\Users\Admin\AppData\Local\Temp\Beta wolf multi tool.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c "Beta wolf multi tool.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4652
        • C:\Windows\system32\PING.EXE
          ping localhost -n 2
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3028
        • C:\Windows\system32\PING.EXE
          ping localhost -n 2
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:5012
        • C:\Windows\system32\PING.EXE
          ping localhost -n 3
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4436
        • C:\Windows\system32\PING.EXE
          ping localhost -n 3
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4844
        • C:\Windows\system32\PING.EXE
          ping localhost -n 2
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2760
        • C:\Windows\system32\PING.EXE
          ping localhost -n 5
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3000
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4416
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2072
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2380
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3988
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2448
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:860
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3120
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2320
        • C:\Windows\system32\PING.EXE
          ping localhost -n 1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4592
        • C:\Windows\system32\PING.EXE
          ping 8.8.8.8
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4452
        • C:\Windows\system32\nslookup.exe
          nslookup vbin.net
          3⤵
            PID:1836
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004D4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1328
      • C:\Windows\system32\BackgroundTransferHost.exe
        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
        1⤵
        • Modifies registry class
        PID:4700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\1aec2c12-2a09-4738-8afd-1666064a32be.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Beta wolf multi tool.bat

        Filesize

        15KB

        MD5

        60a00b221314623ee1b2cb035e4c04bf

        SHA1

        691dc5bfee957d81123d2a7c32a4f240ee058850

        SHA256

        82db40080c2d2ba8d1d3119791a26a54c0be16577e75ea504a6e7c9836a9953f

        SHA512

        ae20a6541c5f595a181beff09f3a1e63f272c9bc0719cfc31a0806f906d02d53b0e1cbcdee01399c0be798597e21026ce30c52ac8a452ed27aec5c78ac5df959