Overview
overview
10Static
static
10multitool/...OS.exe
windows10-2004-x64
3multitool/...ts.exe
windows10-2004-x64
1multitool/...d).exe
windows10-2004-x64
3multitool/...at.exe
windows10-2004-x64
10multitool/...UI.dll
windows10-2004-x64
1multitool/...er.exe
windows10-2004-x64
3multitool/...ib.dll
windows10-2004-x64
1multitool/...er.exe
windows10-2004-x64
6multitool/main.bat
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 20:48
Behavioral task
behavioral1
Sample
multitool/files/DDOS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
multitool/files/FastVisits.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
multitool/files/LeanWoofer (Unpacked).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
multitool/files/Release/Discord rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
multitool/files/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
multitool/files/builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
multitool/files/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
multitool/files/woofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
multitool/main.bat
Resource
win10v2004-20241007-en
General
-
Target
multitool/files/FastVisits.exe
-
Size
36KB
-
MD5
c28035f0201a7e5c164336bb9f67c1b6
-
SHA1
c7ac01d8831f142bd19682d3130486b731dca0c6
-
SHA256
1e259f02f569acf752ae378e098e4e156e9e9017c25562cf0372522b2a4c0584
-
SHA512
d7ac6d8a57e78ef061c5e3377783ca0fca91df47eac91d6eb5d6a060208f1d5eed64eb99d4a90a2a34b87622386138f05b9b281af06e97a2648b5a67b4018748
-
SSDEEP
384:k7zrmZoFAhtWU8p9mbZvo96uKguWnC3/e/mxoHz6UAjcZna0ijjAE+moA8cVCLj3:kwWU83mqHnCvegbkaPcEvvnQLdRoHnC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 5020 dw20.exe Token: SeBackupPrivilege 5020 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2000 wrote to memory of 5020 2000 FastVisits.exe 81 PID 2000 wrote to memory of 5020 2000 FastVisits.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\multitool\files\FastVisits.exe"C:\Users\Admin\AppData\Local\Temp\multitool\files\FastVisits.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 11562⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5020
-