Overview
overview
10Static
static
10Malware-1-...30.exe
windows11-21h2-x64
10Malware-1-...40.exe
windows11-21h2-x64
10Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-.../5.exe
windows11-21h2-x64
10Malware-1-...91.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
7Malware-1-...ad.exe
windows11-21h2-x64
3Malware-1-...ti.exe
windows11-21h2-x64
5Malware-1-...an.bat
windows11-21h2-x64
7Malware-1-...an.exe
windows11-21h2-x64
5Malware-1-...ve.bat
windows11-21h2-x64
7Malware-1-...ve.exe
windows11-21h2-x64
6Malware-1-...ya.exe
windows11-21h2-x64
Malware-1-...re.exe
windows11-21h2-x64
10Malware-1-...ry.exe
windows11-21h2-x64
10Malware-1-...ck.exe
windows11-21h2-x64
3Malware-1-...he.exe
windows11-21h2-x64
10Malware-1-...op.exe
windows11-21h2-x64
7Malware-1-...rb.exe
windows11-21h2-x64
10Malware-1-...ue.exe
windows11-21h2-x64
1Malware-1-...ng.exe
windows11-21h2-x64
6Malware-1-...kt.bat
windows11-21h2-x64
7Malware-1-...o3.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
10Malware-1-.../m.exe
windows11-21h2-x64
Malware-1-...o3.exe
windows11-21h2-x64
9Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-...nf.exe
windows11-21h2-x64
10Malware-1-.../o.exe
windows11-21h2-x64
3Malware-1-...B8.exe
windows11-21h2-x64
10Malware-1-...ig.exe
windows11-21h2-x64
10Malware-1-...rv.exe
windows11-21h2-x64
10Analysis
-
max time kernel
900s -
max time network
900s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/01/2025, 13:33
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Malware-1-master/2887140.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/32.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Malware-1-master/5.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/96591.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Malware-1-master/Amadey.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/Download.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Malware-1-master/Illuminati.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win11-20241023-en
Behavioral task
behavioral13
Sample
Malware-1-master/Petya.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Malware-1-master/Software.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/WannaCry.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/apache.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win11-20241023-en
Behavioral task
behavioral19
Sample
Malware-1-master/crb.exe
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Malware-1-master/eternalblue.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/fear.png.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Malware-1-master/getr3kt.bat
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/iimo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Malware-1-master/jey.exe
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/m.exe
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Malware-1-master/mo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/mo332.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Malware-1-master/mysqlconf.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/o.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
Malware-1-master/qOA7iZJcoB8.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/rig.exe
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
Malware-1-master/sserv.exe
Resource
win11-20241007-en
General
-
Target
Malware-1-master/mo332.exe
-
Size
14.0MB
-
MD5
552326e3f16df1857e7918a569dcca50
-
SHA1
3a3fd7027c65c75b3e8930535b27e29b4681814c
-
SHA256
f5d20a2ef757dd374b1651a955a80113b33b87578e3484fd3589565d296d55cc
-
SHA512
a3d00cc28de8131484ebe29d1addfc9e27c9e782a6ec07bee2a19c88ee3afe0f867f8c0c933b6a83946266d46606483d87c8d57b5679cafeeae09eeae1ba41f3
-
SSDEEP
196608:OSfbf3vp28hgy4ohRID4CUAq52Zdm4nKJJmbmChthPtbSttLPSwYJQ:ffT3XhgQRI8C82ZP+MblGttLSpJQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mo332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xdnrxvywni.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mo332.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ xdnrxvywni.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xdnrxvywni.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion userplus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion userplus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mo332.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mo332.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xdnrxvywni.exe -
Executes dropped EXE 3 IoCs
pid Process 3572 xdnrxvywni.exe 3412 userplus.exe 3316 Process not Found -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Wine mo332.exe Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Wine xdnrxvywni.exe -
Loads dropped DLL 5 IoCs
pid Process 3412 userplus.exe 3412 userplus.exe 3316 Process not Found 4076 Process not Found 4076 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\plus = "C:\\Windows\\tzjyatct\\xdnrxvywni.exe" xdnrxvywni.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mo332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xdnrxvywni.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\NlsLexicons00mmx.dll xdnrxvywni.exe File created C:\Windows\system32\NlsLexicons00ssx.dll xdnrxvywni.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1144 mo332.exe 3572 xdnrxvywni.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Media\shomll.log xdnrxvywni.exe File created C:\Windows\tzjyatct\Tempxdnrxvywni.exe userplus.exe File opened for modification C:\Windows\tzjyatct mo332.exe File opened for modification C:\Windows\Fonts.Lists xdnrxvywni.exe File created C:\Windows\tzjyatct\conf.ini xdnrxvywni.exe File opened for modification C:\Windows\tzjyatct\conf.ini xdnrxvywni.exe File created C:\Windows\Setup\Extensionm.dll xdnrxvywni.exe File opened for modification C:\Windows\Media\shomll.log xdnrxvywni.exe File opened for modification C:\Windows\tzjyatct\Tempxdnrxvywni.exe userplus.exe File created C:\Windows\tzjyatct\xdnrxvywni.exe mo332.exe File opened for modification C:\Windows\system\system.log xdnrxvywni.exe File created C:\Windows\PLA\userplus.exe xdnrxvywni.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mo332.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdnrxvywni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ xdnrxvywni.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz xdnrxvywni.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1144 mo332.exe 1144 mo332.exe 1144 mo332.exe 1144 mo332.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3572 xdnrxvywni.exe 3572 xdnrxvywni.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe 3412 userplus.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3572 xdnrxvywni.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3412 userplus.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1144 wrote to memory of 3092 1144 mo332.exe 77 PID 1144 wrote to memory of 3092 1144 mo332.exe 77 PID 1144 wrote to memory of 3092 1144 mo332.exe 77 PID 3092 wrote to memory of 3572 3092 cmd.exe 79 PID 3092 wrote to memory of 3572 3092 cmd.exe 79 PID 3092 wrote to memory of 3572 3092 cmd.exe 79 PID 3572 wrote to memory of 1360 3572 xdnrxvywni.exe 80 PID 3572 wrote to memory of 1360 3572 xdnrxvywni.exe 80 PID 3572 wrote to memory of 1360 3572 xdnrxvywni.exe 80 PID 1360 wrote to memory of 3412 1360 cmd.exe 82 PID 1360 wrote to memory of 3412 1360 cmd.exe 82 PID 1144 wrote to memory of 2268 1144 mo332.exe 83 PID 1144 wrote to memory of 2268 1144 mo332.exe 83 PID 1144 wrote to memory of 2268 1144 mo332.exe 83 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mo332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mo332.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xdnrxvywni.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xdnrxvywni.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe"1⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\tzjyatct\xdnrxvywni.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\tzjyatct\xdnrxvywni.exeC:\Windows\tzjyatct\xdnrxvywni.exe3⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\PLA\userplus.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\PLA\userplus.exeC:\Windows\PLA\userplus.exe5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3412
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mokill.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52db7a58f4892054c7077dab88fd68b86
SHA1acf198a9160a872bc8633fc9185ad317e69bf2a4
SHA25601701b302ab45f11729fac64ba33cd7b53abbc94963578d9813a1f5848e75618
SHA51201926e211445f72f6637f7be04af33339f4acd78b3d2e8f4b6b4e0c28ea6c2662ea0aec976cc8a4f875ab1d12ca20eec7ebf59fe3704f76dc4adac3a0766511c
-
Filesize
233B
MD5d0d780da4a079ec4b25ea31cbe7fafff
SHA155010d852ff80dc34dac1f6bb606d6b0693f9ce2
SHA2562b5053f22f1696811156f544b57813b671d079c85e2c081691a1e9ee343eadc1
SHA5123e65cc88a0445250fe58203e0a85e1801f469d308a03579e1fd4f4c8184f090c505f5da6744895975a9efdaf56dec2eaa66dff43f5132228e980d0ff7e6c56d9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-556537508-2730415644-482548075-1000\3310a4fa6cb9c60504498d7eea986fc2_dd844bc0-09d5-4996-aa38-4ceeb7107a86
Filesize50B
MD545218adff3ea5bde8a8f61987f0f458b
SHA1cf7fffa410795cc2f7703755f0acd17b51a44ad7
SHA256f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4
SHA5128442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018
-
Filesize
2.3MB
MD5336cd9b9a8f4ce243c889407bcdcfa21
SHA14acf0664e7df5c87f9387bc7243b57050d7ce143
SHA256c17d51aac55953b4ca8b3d8c4725528e1eef8f53ac78bd9bdda512daeb1cc3da
SHA512033dd5bf02801ad34e6ea9b5571e9af74f5dc9e0aaf3b9f958a3052b0a579581da857269ddba3dd74f53e251dbcad396fba35ae5b4ae2d72e6e481b6eaa79fd0
-
Filesize
100KB
MD5ca43974f638606af7259397a344e0434
SHA102b7cf6e2a7fd77f619e27c7584180a950aa7fe8
SHA2564f394c128557a3f05c817aae8ddd005e2f462b298b858b1d49277fe574ce6752
SHA512ab986229c156f1404895983399c64513cc13be3083309b9b61413024922fbf3322e203184e19bb5090c78b813a28362d345a1cb229e61e67d91dd803512a4786
-
Filesize
67KB
MD5b1a562ae50903a943e6e0884a7c3aa28
SHA157fcd5de222c7f99bd82372056127841fbc80e6e
SHA2568402155eb3a3fb0fdc7ce7bbea87e8a59d81ae03e46d5d2ff041663d7051d3fc
SHA512a1b7bcce916e80c2cf83029471f665bb0dfe411341c1817a0a3b0bdc758f24a45676b2b000890578320cbb6c4457ed23535188cff2d7fddcacedebcd8a414dab
-
Filesize
4KB
MD561830234ea9c313c27d2891f333328f9
SHA195cc2252ea481dc7d54838cd67e35e387bc8eb79
SHA256984f780ecbc97d108c0591f10acfb64866de14024626f07467d6c2d5156ed881
SHA512dcce834d90c3fc9d25a5d2727d54e669b65629ffc84fc15b6fadac1b2534cd32d8b006afc086748b2a5d430ddfa95494561c5b2e7bd8d1ff3620e56fccebb921
-
Filesize
4KB
MD5c685dc1895bf128edc1c815ddc8d245b
SHA17d55c48b38844385ab3134bc60a88c4ba619b4bb
SHA256083d4167ddbdcaddb02d6445447ec5604c5cab3ed39b105780287913aa553417
SHA512ca9afa2c8b0fb9573dcb3d15e4d09890fcba0b5808de36309783436fb7d8303f95776dfc30930bc4993defb955e5c83e322f3a934351dd73434edb33a7717751
-
Filesize
6.7MB
MD59f1facb9f7dd07342a07b0856c5b48f2
SHA144a23fe809534a90b31ac0c290aee432edc542c2
SHA256afbfdbfdda5fd42a6b4ea7b37f7222651e5461d8138355b9b233eba26766fa58
SHA512868371102c2f4559b5316d85ce6ce197ad60566c9ea81c47707e57b64c5c2c5a18615d9918fee1fc1250996b86ba0a375bfa896f0b3145e9d451de046256745f