Overview
overview
10Static
static
7malware/1/Setup.exe
windows7-x64
10malware/1/Setup.exe
windows10-2004-x64
10malware/2/Setup.exe
windows7-x64
10malware/2/Setup.exe
windows10-2004-x64
10malware/3/...p_.exe
windows7-x64
7malware/3/...p_.exe
windows10-2004-x64
7malware/4/Setup.exe
windows7-x64
10malware/4/Setup.exe
windows10-2004-x64
10malware/5/...ls.dll
windows7-x64
1malware/5/...ls.dll
windows10-2004-x64
1malware/5/...ng.dll
windows7-x64
1malware/5/...ng.dll
windows10-2004-x64
1malware/5/...nt.dll
windows7-x64
1malware/5/...nt.dll
windows10-2004-x64
1malware/5/...pt.dll
windows7-x64
1malware/5/...pt.dll
windows10-2004-x64
1malware/5/...ib.dll
windows7-x64
1malware/5/...ib.dll
windows10-2004-x64
1malware/5/...ns.dll
windows7-x64
1malware/5/...ns.dll
windows10-2004-x64
1malware/5/...on.dll
windows7-x64
1malware/5/...on.dll
windows10-2004-x64
1malware/5/...op.dll
windows7-x64
3malware/5/...op.dll
windows10-2004-x64
3malware/5/...en.dll
windows7-x64
1malware/5/...en.dll
windows10-2004-x64
1malware/5/...te.dll
windows7-x64
1malware/5/...te.dll
windows10-2004-x64
1malware/5/...ty.dll
windows7-x64
1malware/5/...ty.dll
windows10-2004-x64
1malware/5/...api.js
windows7-x64
3malware/5/...api.js
windows10-2004-x64
3Analysis
-
max time kernel
89s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 13:48
Behavioral task
behavioral1
Sample
malware/1/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malware/1/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
malware/2/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
malware/2/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
malware/3/free_sea_of_thieves_hacks_(esp_.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
malware/3/free_sea_of_thieves_hacks_(esp_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
malware/4/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
malware/4/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
malware/5/Data/Plug-ins/root/data/BIBUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
malware/5/Data/Plug-ins/root/data/BIBUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
malware/5/Data/Plug-ins/root/data/CITThreading.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
malware/5/Data/Plug-ins/root/data/CITThreading.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
malware/5/Data/Plug-ins/root/data/CRClient.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
malware/5/Data/Plug-ins/root/data/CRClient.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
malware/5/Data/Plug-ins/root/data/ExtendScript.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
malware/5/Data/Plug-ins/root/data/ExtendScript.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
malware/5/Data/Plug-ins/root/data/JP2KLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
malware/5/Data/Plug-ins/root/data/JP2KLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
malware/5/Data/Plug-ins/root/data/Microsoft.Expression.Interactions.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
malware/5/Data/Plug-ins/root/data/Microsoft.Expression.Interactions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
malware/5/Data/Plug-ins/root/data/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
malware/5/Data/Plug-ins/root/data/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
malware/5/Data/Plug-ins/root/data/SQLite.Interop.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
malware/5/Data/Plug-ins/root/data/SQLite.Interop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
malware/5/Data/Plug-ins/root/data/SharpRaven.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
malware/5/Data/Plug-ins/root/data/SharpRaven.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
malware/5/Data/Plug-ins/root/data/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
malware/5/Data/Plug-ins/root/data/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
malware/5/Data/Plug-ins/root/data/System.Windows.Interactivity.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
malware/5/Data/Plug-ins/root/data/System.Windows.Interactivity.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
malware/5/Data/Plug-ins/root/data/api.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
malware/5/Data/Plug-ins/root/data/api.js
Resource
win10v2004-20241007-en
General
-
Target
malware/3/free_sea_of_thieves_hacks_(esp_.exe
-
Size
2.2MB
-
MD5
bbcbdf10e868888b4e282d7c5ae8284c
-
SHA1
6bcf6542cda09ea714fa9e5c3534f944c5850be7
-
SHA256
62884dd5b5d6a129bc9c7f58d9fd302840aeb3e57606739c5d00ccea4dadc4e5
-
SHA512
9b2c88302551202dd23513105b26d7d96c32759a250fe98533ba6c596fb862881b497616c86900cf81ae4fb5ebbff17ea51a65130deeca259ba9082b33862891
-
SSDEEP
49152:XBuZrEUtZgrzYCbf7iJI7c3955DdN7POGjb:xkLtZS8CbDiAc3955ljb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation free_sea_of_thieves_hacks_(esp_.tmp -
Executes dropped EXE 2 IoCs
pid Process 4940 free_sea_of_thieves_hacks_(esp_.tmp 2752 free_sea_of_thieves_hacks_(esp_.tmp -
Loads dropped DLL 2 IoCs
pid Process 4940 free_sea_of_thieves_hacks_(esp_.tmp 2752 free_sea_of_thieves_hacks_(esp_.tmp -
Unexpected DNS network traffic destination 7 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 217.160.70.42 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 3520 2752 free_sea_of_thieves_hacks_(esp_.tmp 85 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\PC_installer\unins000.dat free_sea_of_thieves_hacks_(esp_.tmp File created C:\Program Files (x86)\PC_installer\unins000.dat free_sea_of_thieves_hacks_(esp_.tmp File created C:\Program Files (x86)\PC_installer\is-BT22T.tmp free_sea_of_thieves_hacks_(esp_.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 844 3520 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free_sea_of_thieves_hacks_(esp_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free_sea_of_thieves_hacks_(esp_.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free_sea_of_thieves_hacks_(esp_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language free_sea_of_thieves_hacks_(esp_.tmp -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3520 explorer.exe 3520 explorer.exe 2752 free_sea_of_thieves_hacks_(esp_.tmp 2752 free_sea_of_thieves_hacks_(esp_.tmp 2752 free_sea_of_thieves_hacks_(esp_.tmp 2752 free_sea_of_thieves_hacks_(esp_.tmp 2752 free_sea_of_thieves_hacks_(esp_.tmp 2752 free_sea_of_thieves_hacks_(esp_.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 free_sea_of_thieves_hacks_(esp_.tmp -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4940 3768 free_sea_of_thieves_hacks_(esp_.exe 82 PID 3768 wrote to memory of 4940 3768 free_sea_of_thieves_hacks_(esp_.exe 82 PID 3768 wrote to memory of 4940 3768 free_sea_of_thieves_hacks_(esp_.exe 82 PID 4940 wrote to memory of 4616 4940 free_sea_of_thieves_hacks_(esp_.tmp 83 PID 4940 wrote to memory of 4616 4940 free_sea_of_thieves_hacks_(esp_.tmp 83 PID 4940 wrote to memory of 4616 4940 free_sea_of_thieves_hacks_(esp_.tmp 83 PID 4616 wrote to memory of 2752 4616 free_sea_of_thieves_hacks_(esp_.exe 84 PID 4616 wrote to memory of 2752 4616 free_sea_of_thieves_hacks_(esp_.exe 84 PID 4616 wrote to memory of 2752 4616 free_sea_of_thieves_hacks_(esp_.exe 84 PID 2752 wrote to memory of 3520 2752 free_sea_of_thieves_hacks_(esp_.tmp 85 PID 2752 wrote to memory of 3520 2752 free_sea_of_thieves_hacks_(esp_.tmp 85 PID 2752 wrote to memory of 3520 2752 free_sea_of_thieves_hacks_(esp_.tmp 85 PID 2752 wrote to memory of 3520 2752 free_sea_of_thieves_hacks_(esp_.tmp 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware\3\free_sea_of_thieves_hacks_(esp_.exe"C:\Users\Admin\AppData\Local\Temp\malware\3\free_sea_of_thieves_hacks_(esp_.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\is-ASH7S.tmp\free_sea_of_thieves_hacks_(esp_.tmp"C:\Users\Admin\AppData\Local\Temp\is-ASH7S.tmp\free_sea_of_thieves_hacks_(esp_.tmp" /SL5="$60180,1468326,832512,C:\Users\Admin\AppData\Local\Temp\malware\3\free_sea_of_thieves_hacks_(esp_.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\malware\3\free_sea_of_thieves_hacks_(esp_.exe"C:\Users\Admin\AppData\Local\Temp\malware\3\free_sea_of_thieves_hacks_(esp_.exe" /VERYSILENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\is-7A7M2.tmp\free_sea_of_thieves_hacks_(esp_.tmp"C:\Users\Admin\AppData\Local\Temp\is-7A7M2.tmp\free_sea_of_thieves_hacks_(esp_.tmp" /SL5="$601D0,1468326,832512,C:\Users\Admin\AppData\Local\Temp\malware\3\free_sea_of_thieves_hacks_(esp_.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 4966⤵
- Program crash
PID:844
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3520 -ip 35201⤵PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD53eaff7e1673fb0c861fb64673fec879a
SHA1a2a807afe6ea5d9b2514905c4a80a95902ccf49a
SHA256f0c623454f125108efc782e97a8e27f79a44f53b91a6bb748941dbf3dd1a8844
SHA512eaef70c564a5c2b9eb04cf87de9fa3d91e4a88afb94b659d2a5ba3814d8122d139a3c738d9b159a3e02848512ecbc206eed6282ae43299717d5f1475e2f96c7b
-
Filesize
299KB
MD5c85f725bedbb8c0d5f969b3d0214b343
SHA1efa71da1cbb6ba1e41f501206f2fe334a45d51cc
SHA25612711f46d3e494e7db4196ee6a3f2940c38d318798a4a86c2abbb23b7695ab35
SHA512acc798eb2dfbc3cc84f02624a69cdbb60a7929352f39a1718ad57323b808e5e7558d984833fb0b4f4524109f73356d7d5b5b5c01c1b013b06af53c01e821c8f1