Overview
overview
10Static
static
10FN CHECKER...ER.exe
windows7-x64
10FN CHECKER...ER.exe
windows10-2004-x64
10FN CHECKER...rp.dll
windows7-x64
1FN CHECKER...rp.dll
windows10-2004-x64
1FN CHECKER...et.dll
windows7-x64
1FN CHECKER...et.dll
windows10-2004-x64
1FN CHECKER...to.dll
windows7-x64
1FN CHECKER...to.dll
windows10-2004-x64
1FN CHECKER...re.dll
windows7-x64
1FN CHECKER...re.dll
windows10-2004-x64
1FN CHECKER...rp.dll
windows7-x64
1FN CHECKER...rp.dll
windows10-2004-x64
1FN CHECKER...Re.dll
windows7-x64
1FN CHECKER...Re.dll
windows10-2004-x64
1FN CHECKER...le.dll
windows7-x64
1FN CHECKER...le.dll
windows10-2004-x64
1FN CHECKER...ne.dll
windows7-x64
1FN CHECKER...ne.dll
windows10-2004-x64
1FN CHECKER...or.dll
windows7-x64
1FN CHECKER...or.dll
windows10-2004-x64
1FN CHECKER...rp.dll
windows7-x64
1FN CHECKER...rp.dll
windows10-2004-x64
1FN CHECKER...ma.dll
windows7-x64
1FN CHECKER...ma.dll
windows10-2004-x64
1FN CHECKER...et.dll
windows7-x64
1FN CHECKER...et.dll
windows10-2004-x64
1FN CHECKER...er.dll
windows7-x64
1FN CHECKER...er.dll
windows10-2004-x64
1FN CHECKER...er.exe
windows7-x64
10FN CHECKER...er.exe
windows10-2004-x64
10FN CHECKER...as.dll
windows7-x64
1FN CHECKER...as.dll
windows10-2004-x64
1Analysis
-
max time kernel
128s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 10:41
Behavioral task
behavioral1
Sample
FN CHECKER/FN CHECKER/FN CHECKER.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FN CHECKER/FN CHECKER/FN CHECKER.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
FN CHECKER/FN CHECKER/bin/AngleSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
FN CHECKER/FN CHECKER/bin/AngleSharp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
FN CHECKER/FN CHECKER/bin/BCrypt.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
FN CHECKER/FN CHECKER/bin/BCrypt.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
FN CHECKER/FN CHECKER/bin/BouncyCastle.Crypto.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
FN CHECKER/FN CHECKER/bin/BouncyCastle.Crypto.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
FN CHECKER/FN CHECKER/bin/CaptchaSharp.Services.More.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
FN CHECKER/FN CHECKER/bin/CaptchaSharp.Services.More.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FN CHECKER/FN CHECKER/bin/CaptchaSharp.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
FN CHECKER/FN CHECKER/bin/CaptchaSharp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
FN CHECKER/FN CHECKER/bin/CloudflareSolverRe.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
FN CHECKER/FN CHECKER/bin/CloudflareSolverRe.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
FN CHECKER/FN CHECKER/bin/Colorful.Console.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
FN CHECKER/FN CHECKER/bin/Colorful.Console.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
FN CHECKER/FN CHECKER/bin/CommandLine.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
FN CHECKER/FN CHECKER/bin/CommandLine.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
FN CHECKER/FN CHECKER/bin/CommonServiceLocator.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
FN CHECKER/FN CHECKER/bin/CommonServiceLocator.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
FN CHECKER/FN CHECKER/bin/CryptSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
FN CHECKER/FN CHECKER/bin/CryptSharp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
FN CHECKER/FN CHECKER/bin/Esprima.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
FN CHECKER/FN CHECKER/bin/Esprima.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
FN CHECKER/FN CHECKER/bin/Extreme.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
FN CHECKER/FN CHECKER/bin/Extreme.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
FN CHECKER/FN CHECKER/bin/Fizzler.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
FN CHECKER/FN CHECKER/bin/Fizzler.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
FN CHECKER/FN CHECKER/bin/Fortnite checker.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
FN CHECKER/FN CHECKER/bin/Fortnite checker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
FN CHECKER/FN CHECKER/bin/GalaSoft.MvvmLight.Extras.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
FN CHECKER/FN CHECKER/bin/GalaSoft.MvvmLight.Extras.dll
Resource
win10v2004-20241007-en
General
-
Target
FN CHECKER/FN CHECKER/FN CHECKER.exe
-
Size
997KB
-
MD5
d428119c48f140f0c31ebcef8d9d8f8a
-
SHA1
af9e82b05da11ea19d3381829ae56d2c3e74491b
-
SHA256
4b857cbd956518dfb4150be4da9e0c33eb31d086a99cae49c13713e32b24c9db
-
SHA512
5b0e34fa4cdfbd7f1b959ca5d7d739340165d6e95fa4bb3e198d20043f790c5d42afb784b27828fa19493c8137e7a25abbdcf34846e211d33954349bafa680b8
-
SSDEEP
24576:5FyISeHTiJKkt9SrQOLS7dUL/3rhEdMP9Mg:5EI1+IxrrLS0ThEdMKg
Malware Config
Extracted
xworm
3.1
daddy.linkpc.net:7000
487KBZwHTRfdTb7E
-
install_file
USB.exe
Signatures
-
Detect Neshta payload 2 IoCs
resource yara_rule behavioral1/files/0x000a0000000120d5-6.dat family_neshta behavioral1/memory/2024-47-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000b0000000120d5-58.dat family_xworm behavioral1/memory/996-60-0x0000000000E20000-0x0000000000E30000-memory.dmp family_xworm -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Xworm family
-
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Executes dropped EXE 5 IoCs
pid Process 2024 FN CHECKER.exe 2908 FJQQND.exe 2736 FN CHECKER.exe 2772 Payload.exe 996 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 FN CHECKER.exe 2024 FN CHECKER.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" FN CHECKER.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2908-50-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe -
resource yara_rule behavioral1/files/0x000500000001c880-17.dat upx behavioral1/memory/2908-29-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2908-50-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com FN CHECKER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FN CHECKER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FJQQND.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FN CHECKER.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2640 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2040 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" FN CHECKER.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 996 svchost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3036 FN CHECKER.exe 3036 FN CHECKER.exe 3036 FN CHECKER.exe 2772 Payload.exe 2772 Payload.exe 2772 Payload.exe 996 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3036 FN CHECKER.exe Token: SeDebugPrivilege 2772 Payload.exe Token: SeDebugPrivilege 2040 taskkill.exe Token: SeDebugPrivilege 996 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 996 svchost.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2024 3036 FN CHECKER.exe 30 PID 3036 wrote to memory of 2024 3036 FN CHECKER.exe 30 PID 3036 wrote to memory of 2024 3036 FN CHECKER.exe 30 PID 3036 wrote to memory of 2024 3036 FN CHECKER.exe 30 PID 3036 wrote to memory of 2908 3036 FN CHECKER.exe 31 PID 3036 wrote to memory of 2908 3036 FN CHECKER.exe 31 PID 3036 wrote to memory of 2908 3036 FN CHECKER.exe 31 PID 3036 wrote to memory of 2908 3036 FN CHECKER.exe 31 PID 2024 wrote to memory of 2736 2024 FN CHECKER.exe 32 PID 2024 wrote to memory of 2736 2024 FN CHECKER.exe 32 PID 2024 wrote to memory of 2736 2024 FN CHECKER.exe 32 PID 2024 wrote to memory of 2736 2024 FN CHECKER.exe 32 PID 3036 wrote to memory of 2772 3036 FN CHECKER.exe 34 PID 3036 wrote to memory of 2772 3036 FN CHECKER.exe 34 PID 3036 wrote to memory of 2772 3036 FN CHECKER.exe 34 PID 3036 wrote to memory of 2652 3036 FN CHECKER.exe 35 PID 3036 wrote to memory of 2652 3036 FN CHECKER.exe 35 PID 3036 wrote to memory of 2652 3036 FN CHECKER.exe 35 PID 2652 wrote to memory of 2640 2652 cmd.exe 37 PID 2652 wrote to memory of 2640 2652 cmd.exe 37 PID 2652 wrote to memory of 2640 2652 cmd.exe 37 PID 2772 wrote to memory of 2040 2772 Payload.exe 38 PID 2772 wrote to memory of 2040 2772 Payload.exe 38 PID 2772 wrote to memory of 2040 2772 Payload.exe 38 PID 2772 wrote to memory of 1508 2772 Payload.exe 41 PID 2772 wrote to memory of 1508 2772 Payload.exe 41 PID 2772 wrote to memory of 1508 2772 Payload.exe 41 PID 2772 wrote to memory of 1940 2772 Payload.exe 43 PID 2772 wrote to memory of 1940 2772 Payload.exe 43 PID 2772 wrote to memory of 1940 2772 Payload.exe 43 PID 1716 wrote to memory of 996 1716 taskeng.exe 45 PID 1716 wrote to memory of 996 1716 taskeng.exe 45 PID 1716 wrote to memory of 996 1716 taskeng.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FN CHECKER\FN CHECKER\FN CHECKER.exe"C:\Users\Admin\AppData\Local\Temp\FN CHECKER\FN CHECKER\FN CHECKER.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\FN CHECKER.exe"C:\Users\Admin\AppData\Local\Temp\FN CHECKER.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FN CHECKER.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\FN CHECKER.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\FJQQND.exe"C:\Users\Admin\AppData\Local\Temp\FJQQND.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /im "svchost.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\system32\schtasks.exeschtasks /run /TN "Update"3⤵PID:1508
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Del.vbs"3⤵PID:1940
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBB25.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2640
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {DA4D76A1-C295-42B7-9235-552EFF029E21} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD54ea5c70d869d3a252b80ded9d17b0476
SHA1c459b39cb29705564b2b3f81a2679d048bb66a2f
SHA256d5c059ac87836bcdb43e937544ed82fbb83f0b6e43b12559ec899c340f25640d
SHA512f9b9fb91af71f527caa76886e6b3bc8fbea824efd98178a5631daec91582c4ca5c8a1d01aae6be2b06b338be1d03e5a0b7893d83988241a9f2e2fe682c94acd0
-
Filesize
146B
MD5a16d3da73c27fe0357e68065ddebb766
SHA15dd815f9b8696ec9537f5d8c89a71f14cdac650d
SHA25664b7650c3b9dad3f49cd2a8a5aac82a3a8df1b8bd153a1b535e720d8c87f7ce7
SHA512057388b481bd71aaebcae06d729875fb187eb12af8d1041e726f20d099859f1682304b8b3b5c7eacd19246d0c93405c3637ac546de6fa2c8e0a7945645a1940d
-
Filesize
781KB
MD568bcd60eb0ae68db9a6e2052df7b8270
SHA1dc468b9b0b208511e6ddaeeb3acd4f43415d4fb6
SHA256a287ab3424e595e875f31e4d893c14e70cf8cbd995ad38c6d29ce578c63e4a27
SHA51268503c432c0199e62a82c857b2eef8a83dfc41513a37e36ed512668632f72d31fd646c4659376abbd4dc487ce0b739820e0ae16ddf76c4534eefeba1ce0567c7
-
Filesize
129KB
MD5a446aa2b4904d28be4a7cc4c2490b1ed
SHA1989a6f990fc6ef5e107b4d2883a8d47e2545ca76
SHA256430241400ff1f21b9c90fd42ceebe570f67aa9e39a0e9002283eebd9b6b5f19c
SHA512b8584f0a0d1e15594d7f1060a2883ab882b36673ff714b91bf9cab737cd685295fa142498d67fe0895d3cd5220a8f87c694fe7e11004eed02343fed953829d38
-
Filesize
262KB
MD51ecb45c5fcc8fe15e26cfa6eada84ed7
SHA1798c9710e59324aef944c21b273206cdb1ece070
SHA256d00e631cc47689cead47c38d535d8dc7bf8bbcc9f34ed46fa1d2b7fe232f0be5
SHA512d26f9987f327ce5b5bfcc9dbcdbd19918e4b3a771d5a75b035dd6aab1ba0b43c92be0257451c26921a57ff4ddfac90a173e956f94113891bb19dc62b34dc2953
-
Filesize
184B
MD5d319ef3443399d98667ade71f5e149ea
SHA10739cabd53f0927f877c5a8b344e8daf5809d4c4
SHA256e16cfdc9b239f4efcc1ba66ddaa597a7e2136d170656a5c12229952089e21488
SHA512a4ca06d38cef6b4d1d4d21102af09e021eb8e3fdc67013b5cc1f870664c51b84ff68132e7cf9a4fad2ba2002c8516a5fdc6020d1c81bfa03f664b44ef55133c8
-
Filesize
36KB
MD5baf73551953ceb6ecbb13dbf164bfd6d
SHA119273b3eddbf9b9290401ae1cfcb3e664e042cfb
SHA256b4de1d430d856f1fe1045eb90f8bf870795d0f6b09b930417d2648ebc64d69b4
SHA51215a00412bb6c6095d2e05c62725c33bfff79a11f1f12435d964b3b9fe37bedb8b41e67e8e0f4b515b34fb22326424c3d3f3f4c04596c6973da56d50efa888943