Overview
overview
3Static
static
1ddos-tool.zip
windows10-2004-x64
1ddos-tool/LICENSE
windows10-2004-x64
1ddos-tool/README.md
windows10-2004-x64
3ddos-tool/config.json
windows10-2004-x64
3ddos-tool/...tp.txt
windows10-2004-x64
1ddos-tool/...rs.txt
windows10-2004-x64
1ddos-tool/...nt.txt
windows10-2004-x64
1ddos-tool/main.py
windows10-2004-x64
3ddos-tool/...ts.txt
windows10-2004-x64
1ddos-tool/start.bat
windows10-2004-x64
1Analysis
-
max time kernel
44s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
ddos-tool.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
ddos-tool/LICENSE
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ddos-tool/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
ddos-tool/config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ddos-tool/files/proxies/http.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
ddos-tool/files/referers.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ddos-tool/files/useragent.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
ddos-tool/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ddos-tool/requirements.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
ddos-tool/start.bat
Resource
win10v2004-20241007-en
General
-
Target
ddos-tool/README.md
-
Size
830B
-
MD5
46cc96351dcc54f692b3acebd8ecc65a
-
SHA1
8447aee23107390fa2647eedcfac8121b921f72d
-
SHA256
86428734999901a6094d3726568e5feb707028c22c52c8cb890d87052da6770d
-
SHA512
43ea0db2b481506638d65bc84706aa5c974350e272b88e2d40356c1a4a13a619e61583ec20e2d549fe17491393fee1e08680dbad28839f7da5fb6dc0aa382696
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file\shell\edit OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file\shell\edit\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.md\ = "md_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\䩒ᛲᤀ耀 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\䩝ᛳ᠀蠀͐ﲕȩ OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\䩝ᛳ᠀蠀͐ﲕȩ\ = "md_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\䩒ᛲᤀ耀\ = "md_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.md OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\md_auto_file OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1840 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe 1840 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4584 1840 OpenWith.exe 102 PID 1840 wrote to memory of 4584 1840 OpenWith.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ddos-tool\README.md1⤵
- Modifies registry class
PID:4740
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ddos-tool\README.md2⤵PID:4584
-