Analysis

  • max time kernel
    146s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 04:04

General

  • Target

    Ultimate-DDoS-Attack-Tools-Pack/Dos Attacker Alpha 1.1/Black Mamba Dos Attacker.exe

  • Size

    376KB

  • MD5

    4fdb2d64ebf02ba076504269d3d0e2e6

  • SHA1

    6c428aaa2f5f7c11ef6feb1b87eb4492f9f48902

  • SHA256

    ae05c0818cef52933d1c9dccb5bc61c79d0c80e9ab32d429cc097ff2509d88d4

  • SHA512

    2e2357f94cb4b510f4849c1b1265b6a8ab4914e8a1ca2bd140ffdfa125aaaa3d8d5cf1ffe03990d8385d4c1f7b6feb9aa813b8bb670d9e8b88ec9e4038b29fd9

  • SSDEEP

    6144:W/pUPZGwnKPvjiweFHDi+DZUdHDgKhHot8sJAqRTqsTgMcq7o:RxpnkPeFHDHCDHoGMvpqsTgMcq7o

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ultimate-DDoS-Attack-Tools-Pack\Dos Attacker Alpha 1.1\Black Mamba Dos Attacker.exe
    "C:\Users\Admin\AppData\Local\Temp\Ultimate-DDoS-Attack-Tools-Pack\Dos Attacker Alpha 1.1\Black Mamba Dos Attacker.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\ProgramData\wscsvc\wscsvc.exe
      C:\ProgramData\\wscsvc\\wscsvc.exe ,.
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1472
    • C:\Users\Admin\AppData\Local\Temp\Ultimate-DDoS-Attack-Tools-Pack\Dos Attacker Alpha 1.1\libEGL32.bin
      libEGL32.bin
      2⤵
        PID:4964
      • C:\ProgramData\wupdater\wupdater.exe
        C:\ProgramData\\wupdater\\wupdater.exe cZmBw0ZVYxDe71qF2tuKZb8qoKe12vc572NITBUDTA9fVGMrpwMymLtJwR8hV7H6
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\wscsvc\wscsvc.exe

      Filesize

      275KB

      MD5

      b9352fa2d673bf124116ba9e5639956e

      SHA1

      f511f3b653fc0a7a3e49d1cc58c21c9a53fcf79b

      SHA256

      58a0b8c13f085a3181fecc5d97cdfe5e35892af6b4b31d79657fc88512bb520d

      SHA512

      eea7bd7ff2023e2239b6d5a5ba96d4ecdab4217ecdd6f7403947aa09b1dd54db533bde3b8ef2256cdb720086754c716842bf98810c135b4d72f281dfe5dd48df

    • C:\ProgramData\wupdater\wupdater.exe

      Filesize

      1.8MB

      MD5

      26f56121184843056f1d6e6db3f9844b

      SHA1

      f8d6c767cab3be5e55608cc5abd30a4c383759e9

      SHA256

      3ad26e1c16b6f49c6136c0c1c02c5943437349a310a6bcc5a8a0f4924a6f4ae4

      SHA512

      13a0898a6780f474ab4ffe8e46ca0227f03f2c4d26daaf4b61862eb7374a65d887b96a8672f21247e7f3aac4c49cce77521dd1564983b52f8716219aff894b9d

    • memory/4964-14-0x00007FF943485000-0x00007FF943486000-memory.dmp

      Filesize

      4KB

    • memory/4964-15-0x00007FF9431D0000-0x00007FF943B71000-memory.dmp

      Filesize

      9.6MB

    • memory/4964-16-0x000000001B830000-0x000000001B8D6000-memory.dmp

      Filesize

      664KB

    • memory/4964-17-0x00007FF9431D0000-0x00007FF943B71000-memory.dmp

      Filesize

      9.6MB

    • memory/4964-18-0x000000001BDB0000-0x000000001C27E000-memory.dmp

      Filesize

      4.8MB

    • memory/4964-19-0x000000001C350000-0x000000001C3EC000-memory.dmp

      Filesize

      624KB

    • memory/4964-20-0x0000000000FF0000-0x0000000000FF8000-memory.dmp

      Filesize

      32KB

    • memory/4964-21-0x000000001C5B0000-0x000000001C5FC000-memory.dmp

      Filesize

      304KB

    • memory/4964-22-0x00007FF9431D0000-0x00007FF943B71000-memory.dmp

      Filesize

      9.6MB

    • memory/4964-23-0x00007FF9431D0000-0x00007FF943B71000-memory.dmp

      Filesize

      9.6MB

    • memory/4964-24-0x00007FF943485000-0x00007FF943486000-memory.dmp

      Filesize

      4KB

    • memory/4964-25-0x00007FF9431D0000-0x00007FF943B71000-memory.dmp

      Filesize

      9.6MB