Overview
overview
10Static
static
3windows-ma...00.exe
windows7-x64
windows-ma...00.exe
windows10-2004-x64
windows-ma...fy.exe
windows7-x64
8windows-ma...fy.exe
windows10-2004-x64
8windows-ma...or.exe
windows7-x64
windows-ma...or.exe
windows10-2004-x64
windows-ma...XT.vbs
windows7-x64
1windows-ma...XT.vbs
windows10-2004-x64
1windows-ma...ck.exe
windows7-x64
6windows-ma...ck.exe
windows10-2004-x64
7windows-ma....0.exe
windows7-x64
windows-ma....0.exe
windows10-2004-x64
windows-ma...p).exe
windows7-x64
10windows-ma...p).exe
windows10-2004-x64
Analysis
-
max time kernel
6s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
windows-malware-master/000/000.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
windows-malware-master/000/000.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
windows-malware-master/Bonzify/Bonzify.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
windows-malware-master/Bonzify/Bonzify.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
windows-malware-master/BossDaMajor/BossDaMajor.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
windows-malware-master/BossDaMajor/BossDaMajor.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
windows-malware-master/ILOVEYOU/LOVE-LETTER-FOR-YOU.TXT.vbs
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
windows-malware-master/ILOVEYOU/LOVE-LETTER-FOR-YOU.TXT.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
windows-malware-master/MEMZ/geometry dash auto speedhack.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
windows-malware-master/MEMZ/geometry dash auto speedhack.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
windows-malware-master/MrsMajor 2.0/MrsMajor2.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
windows-malware-master/MrsMajor 2.0/MrsMajor2.0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
windows-malware-master/WinXP Horror Edition/WinXP.Horror.Destructive (Created By WobbyChip).exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
windows-malware-master/WinXP Horror Edition/WinXP.Horror.Destructive (Created By WobbyChip).exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
windows-malware-master/000/000.exe
-
Size
6.7MB
-
MD5
d5671758956b39e048680b6a8275e96a
-
SHA1
33c341130bf9c93311001a6284692c86fec200ef
-
SHA256
4a900b344ef765a66f98cf39ac06273d565ca0f5d19f7ea4ca183786155d4a47
-
SHA512
972e89ed8b7b4d75df0a05c53e71fb5c29edaa173d7289656676b9d2a1ed439be1687beddc6fb1fbf068868c3da9c3d2deb03b55e5ab5e7968858b5efc49fbe7
-
SSDEEP
3072:V3LA1++iCeFj0im6X/AXpT8vVMCcHVcdhghUuzzo9Y:lLJlC6j0CX4XmvWHVcd62uo9
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
000.exedescription ioc process File opened (read-only) \??\J: 000.exe File opened (read-only) \??\N: 000.exe File opened (read-only) \??\P: 000.exe File opened (read-only) \??\Q: 000.exe File opened (read-only) \??\R: 000.exe File opened (read-only) \??\T: 000.exe File opened (read-only) \??\A: 000.exe File opened (read-only) \??\G: 000.exe File opened (read-only) \??\H: 000.exe File opened (read-only) \??\K: 000.exe File opened (read-only) \??\M: 000.exe File opened (read-only) \??\O: 000.exe File opened (read-only) \??\S: 000.exe File opened (read-only) \??\X: 000.exe File opened (read-only) \??\Y: 000.exe File opened (read-only) \??\B: 000.exe File opened (read-only) \??\E: 000.exe File opened (read-only) \??\I: 000.exe File opened (read-only) \??\W: 000.exe File opened (read-only) \??\L: 000.exe File opened (read-only) \??\U: 000.exe File opened (read-only) \??\V: 000.exe File opened (read-only) \??\Z: 000.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
000.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoRestartShell = "0" 000.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
000.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\Desktop\Wallpaper 000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 5088 taskkill.exe 2152 taskkill.exe -
Modifies registry class 2 IoCs
Processes:
000.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-200405930-3877336739-3533750831-1000\{39026D8A-6948-49C3-B7A2-FE8A85D483E6} 000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\icon.ico" 000.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exe000.exetaskkill.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 5088 taskkill.exe Token: SeShutdownPrivilege 5048 000.exe Token: SeCreatePagefilePrivilege 5048 000.exe Token: SeDebugPrivilege 2152 taskkill.exe Token: SeIncreaseQuotaPrivilege 2212 WMIC.exe Token: SeSecurityPrivilege 2212 WMIC.exe Token: SeTakeOwnershipPrivilege 2212 WMIC.exe Token: SeLoadDriverPrivilege 2212 WMIC.exe Token: SeSystemProfilePrivilege 2212 WMIC.exe Token: SeSystemtimePrivilege 2212 WMIC.exe Token: SeProfSingleProcessPrivilege 2212 WMIC.exe Token: SeIncBasePriorityPrivilege 2212 WMIC.exe Token: SeCreatePagefilePrivilege 2212 WMIC.exe Token: SeBackupPrivilege 2212 WMIC.exe Token: SeRestorePrivilege 2212 WMIC.exe Token: SeShutdownPrivilege 2212 WMIC.exe Token: SeDebugPrivilege 2212 WMIC.exe Token: SeSystemEnvironmentPrivilege 2212 WMIC.exe Token: SeRemoteShutdownPrivilege 2212 WMIC.exe Token: SeUndockPrivilege 2212 WMIC.exe Token: SeManageVolumePrivilege 2212 WMIC.exe Token: 33 2212 WMIC.exe Token: 34 2212 WMIC.exe Token: 35 2212 WMIC.exe Token: 36 2212 WMIC.exe Token: SeIncreaseQuotaPrivilege 2212 WMIC.exe Token: SeSecurityPrivilege 2212 WMIC.exe Token: SeTakeOwnershipPrivilege 2212 WMIC.exe Token: SeLoadDriverPrivilege 2212 WMIC.exe Token: SeSystemProfilePrivilege 2212 WMIC.exe Token: SeSystemtimePrivilege 2212 WMIC.exe Token: SeProfSingleProcessPrivilege 2212 WMIC.exe Token: SeIncBasePriorityPrivilege 2212 WMIC.exe Token: SeCreatePagefilePrivilege 2212 WMIC.exe Token: SeBackupPrivilege 2212 WMIC.exe Token: SeRestorePrivilege 2212 WMIC.exe Token: SeShutdownPrivilege 2212 WMIC.exe Token: SeDebugPrivilege 2212 WMIC.exe Token: SeSystemEnvironmentPrivilege 2212 WMIC.exe Token: SeRemoteShutdownPrivilege 2212 WMIC.exe Token: SeUndockPrivilege 2212 WMIC.exe Token: SeManageVolumePrivilege 2212 WMIC.exe Token: 33 2212 WMIC.exe Token: 34 2212 WMIC.exe Token: 35 2212 WMIC.exe Token: 36 2212 WMIC.exe Token: SeIncreaseQuotaPrivilege 4672 WMIC.exe Token: SeSecurityPrivilege 4672 WMIC.exe Token: SeTakeOwnershipPrivilege 4672 WMIC.exe Token: SeLoadDriverPrivilege 4672 WMIC.exe Token: SeSystemProfilePrivilege 4672 WMIC.exe Token: SeSystemtimePrivilege 4672 WMIC.exe Token: SeProfSingleProcessPrivilege 4672 WMIC.exe Token: SeIncBasePriorityPrivilege 4672 WMIC.exe Token: SeCreatePagefilePrivilege 4672 WMIC.exe Token: SeBackupPrivilege 4672 WMIC.exe Token: SeRestorePrivilege 4672 WMIC.exe Token: SeShutdownPrivilege 4672 WMIC.exe Token: SeDebugPrivilege 4672 WMIC.exe Token: SeSystemEnvironmentPrivilege 4672 WMIC.exe Token: SeRemoteShutdownPrivilege 4672 WMIC.exe Token: SeUndockPrivilege 4672 WMIC.exe Token: SeManageVolumePrivilege 4672 WMIC.exe Token: 33 4672 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
000.exepid process 5048 000.exe 5048 000.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
000.execmd.exedescription pid process target process PID 5048 wrote to memory of 372 5048 000.exe cmd.exe PID 5048 wrote to memory of 372 5048 000.exe cmd.exe PID 5048 wrote to memory of 372 5048 000.exe cmd.exe PID 372 wrote to memory of 5088 372 cmd.exe taskkill.exe PID 372 wrote to memory of 5088 372 cmd.exe taskkill.exe PID 372 wrote to memory of 5088 372 cmd.exe taskkill.exe PID 372 wrote to memory of 2152 372 cmd.exe taskkill.exe PID 372 wrote to memory of 2152 372 cmd.exe taskkill.exe PID 372 wrote to memory of 2152 372 cmd.exe taskkill.exe PID 372 wrote to memory of 2212 372 cmd.exe WMIC.exe PID 372 wrote to memory of 2212 372 cmd.exe WMIC.exe PID 372 wrote to memory of 2212 372 cmd.exe WMIC.exe PID 372 wrote to memory of 4672 372 cmd.exe WMIC.exe PID 372 wrote to memory of 4672 372 cmd.exe WMIC.exe PID 372 wrote to memory of 4672 372 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows-malware-master\000\000.exe"C:\Users\Admin\AppData\Local\Temp\windows-malware-master\000\000.exe"1⤵
- Enumerates connected drives
- Modifies WinLogon
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\windl.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' set FullName='UR NEXT'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' rename 'UR NEXT'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\shutdown.exeshutdown /f /r /t 03⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3948055 /state1:0x41c64e6d1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdbFilesize
896KB
MD5d71a3e7300157f2687b8b04289f1d15d
SHA18bbd2f88c3f9ba8a904fad6bc9468839a02934da
SHA25642dc1faaf4c23433c8ceddba8e9c16d0c3ebcf1b4bb172353043631fedcad921
SHA51273ec541d9964600ab55cebd6322b1d007c76929815e1aac02d56bffdc7c52e6f8af961ada7a62623087077be98d2679ded356d0ff052c94aa0442307b3ed598f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XMLFilesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Temp\one.rtfFilesize
403B
MD56fbd6ce25307749d6e0a66ebbc0264e7
SHA1faee71e2eac4c03b96aabecde91336a6510fff60
SHA256e152b106733d9263d3cf175f0b6197880d70acb753f8bde8035a3e4865b31690
SHA51235a0d6d91178ec10619cf4d2fd44d3e57aa0266e1779e15b1eef6e9c359c77c384e0ffe4edb2cde980a6847e53f47733e6eacb72d46762066b3541dee3d29064
-
C:\Users\Admin\AppData\Local\Temp\rniw.exeFilesize
76KB
MD59232120b6ff11d48a90069b25aa30abc
SHA197bb45f4076083fca037eee15d001fd284e53e47
SHA25670faa0e1498461731f873d3594f20cbf2beaa6f123a06b66f9df59a9cdf862be
SHA512b06688a9fc0b853d2895f11e812c48d5871f2793183fda5e9638ded22fc5dc1e813f174baedc980a1f0b6a7b0a65cd61f29bb16acc6dd45da62988eb012d6877
-
C:\Users\Admin\AppData\Local\Temp\windl.batFilesize
771B
MD5a9401e260d9856d1134692759d636e92
SHA14141d3c60173741e14f36dfe41588bb2716d2867
SHA256b551fba71dfd526d4916ae277d8686d83fff36d22fcf6f18457924a070b30ef7
SHA5125cbe38cdab0283b87d9a9875f7ba6fa4e8a7673d933ca05deddddbcf6cf793bd1bf34ac0add798b4ed59ab483e49f433ce4012f571a658bc0add28dd987a57b6
-
C:\Users\Admin\Desktop\UR NEXT UR NEXT UR NEXT UR NEXT UR NEXT UR NEXT UR NEXT UR N1XT.txtFilesize
396B
MD59037ebf0a18a1c17537832bc73739109
SHA11d951dedfa4c172a1aa1aae096cfb576c1fb1d60
SHA25638c889b5d7bdcb79bbcb55554c520a9ce74b5bfc29c19d1e4cb1419176c99f48
SHA5124fb5c06089524c6dcd48b6d165cedb488e9efe2d27613289ef8834dbb6c010632d2bd5e3ac75f83b1d8024477ebdf05b9e0809602bbe1780528947c36e4de32f
-
memory/5048-30-0x000000000C700000-0x000000000C710000-memory.dmpFilesize
64KB
-
memory/5048-34-0x000000000C6C0000-0x000000000C6D0000-memory.dmpFilesize
64KB
-
memory/5048-23-0x000000000C570000-0x000000000C57E000-memory.dmpFilesize
56KB
-
memory/5048-22-0x000000000C5B0000-0x000000000C5E8000-memory.dmpFilesize
224KB
-
memory/5048-0-0x000000007474E000-0x000000007474F000-memory.dmpFilesize
4KB
-
memory/5048-31-0x000000000C700000-0x000000000C710000-memory.dmpFilesize
64KB
-
memory/5048-32-0x000000000C700000-0x000000000C710000-memory.dmpFilesize
64KB
-
memory/5048-29-0x000000000C700000-0x000000000C710000-memory.dmpFilesize
64KB
-
memory/5048-33-0x000000000C6C0000-0x000000000C6D0000-memory.dmpFilesize
64KB
-
memory/5048-11-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/5048-36-0x000000000C700000-0x000000000C710000-memory.dmpFilesize
64KB
-
memory/5048-35-0x000000000C700000-0x000000000C710000-memory.dmpFilesize
64KB
-
memory/5048-37-0x000000000C6C0000-0x000000000C6D0000-memory.dmpFilesize
64KB
-
memory/5048-3-0x00000000061A0000-0x0000000006744000-memory.dmpFilesize
5.6MB
-
memory/5048-2-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/5048-1-0x0000000000A60000-0x000000000110E000-memory.dmpFilesize
6.7MB
-
memory/5048-856-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB