Analysis
-
max time kernel
72s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 06:34
Behavioral task
behavioral1
Sample
pizzasrolle_ddostool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
pizzasrolle_ddostool.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�[.S���.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
�[.S���.pyc
Resource
win10v2004-20241007-en
General
-
Target
pizzasrolle_ddostool.exe
-
Size
7.6MB
-
MD5
776a2bbeea896973605cdd415293b52a
-
SHA1
29c2f38150329dfa79b634be4f4ff60e1de501d4
-
SHA256
2a2246e0933c66735c0c88541f20a738649b0caf18d8327c422b53f4019659b3
-
SHA512
e9a8f478943d322a5b52e797c6e7ae701e8e8606cbbbf63b1a59c7e509303c7b3f7254fcefbf3db29d85888d71e4508041b0b7ebd654d0a3fe3ee6fe5c840ae1
-
SSDEEP
196608:72HY/yCwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:ZyBIHziK1piXLGVE4Ue0VJI
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2532 pizzasrolle_ddostool.exe -
resource yara_rule behavioral1/files/0x00050000000191ff-21.dat upx behavioral1/memory/2532-23-0x000007FEF5EE0000-0x000007FEF6543000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2608 chrome.exe 2608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2532 2068 pizzasrolle_ddostool.exe 30 PID 2068 wrote to memory of 2532 2068 pizzasrolle_ddostool.exe 30 PID 2068 wrote to memory of 2532 2068 pizzasrolle_ddostool.exe 30 PID 2608 wrote to memory of 948 2608 chrome.exe 37 PID 2608 wrote to memory of 948 2608 chrome.exe 37 PID 2608 wrote to memory of 948 2608 chrome.exe 37 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2832 2608 chrome.exe 39 PID 2608 wrote to memory of 2856 2608 chrome.exe 40 PID 2608 wrote to memory of 2856 2608 chrome.exe 40 PID 2608 wrote to memory of 2856 2608 chrome.exe 40 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41 PID 2608 wrote to memory of 1892 2608 chrome.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\pizzasrolle_ddostool.exe"C:\Users\Admin\AppData\Local\Temp\pizzasrolle_ddostool.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\pizzasrolle_ddostool.exe"C:\Users\Admin\AppData\Local\Temp\pizzasrolle_ddostool.exe"2⤵
- Loads dropped DLL
PID:2532
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\HideConnect.bat" "1⤵PID:2592
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\HideConnect.bat" "1⤵PID:2620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a49758,0x7fef6a49768,0x7fef6a497782⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:22⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1396 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1784 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2000 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2276 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:22⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2236 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3704 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3776 --field-trial-handle=2024,i,11428571173698086569,313648939605907608,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD5778aff51b98a2af31120b84266d03e21
SHA12a585553c68078b13c798149d28b9e7f802400fc
SHA25694a6a218d783392a9b049d49f34ad198b7e3934aca6d3b3ecc1a2d8fcc489295
SHA512494a9b5b3ca08a64a2a541e701d4e9a3d15bb2e0adb919959dac76de3d463e718cf511292d5ec0e8bc75fa8256417c82331de660190cf58205fe4d04eb835193
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD588e293b230d184e684c0e592303c05f8
SHA1402423093f5e1f0af7d40e10c2dcb0c820747cef
SHA25610fdd9625a8f92477ec4b30f1d25ddaacbcca17eb440babf359258f8eab856de
SHA5120b8c77bc844b6d457ac30d613b4d8b3d4f60be7623831938967f3ef9529f3798540119210b5829ded757d2a61fec8600fce7ad11ad57bfe89d16e1474406adc4
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
349KB
MD5fa138a927bee8a4c90f4a27fb5f78f7f
SHA132764e5e73f6710af5a48215facce8bf0ab93ba2
SHA2562d7e22295d58ccab26fcf0183b6000065f8822c63ee8bd1f1f85a6b04a922fb4
SHA5121f214f54cba073dd192065550724c56bb6175a511c8dd22994065c83464d8fdb20066414c6a2630560e006ffec2d84db6de9f82cf4dbf657ce21f91923fcdc1d
-
Filesize
170KB
MD5914afa90215da8f1296b6048e9bcd820
SHA19a1968ed4f6ecf71e77217546cdc9c10585c5e78
SHA25627ab4f90eac06cb7e0d6a8d0af3e2715aa00609885f7a31a308cbe4af1cd5fb2
SHA512866a13f538de7779e1b727f0770c4ceef73105ce090b816c13d7ca4a2a10aa0408a0e7918e1f5282af64ff166dffbe648f9d334be87b137ab1275715e75c7f6c
-
Filesize
1.8MB
MD56ef5d2f77064df6f2f47af7ee4d44f0f
SHA10003946454b107874aa31839d41edcda1c77b0af
SHA256ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367
SHA5121662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266