Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 04:42
Static task
static1
Behavioral task
behavioral1
Sample
少女被干屁眼的唯美肛交色情视频.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
少女被干屁眼的唯美肛交色情视频.exe
Resource
win10v2004-20230915-en
General
-
Target
少女被干屁眼的唯美肛交色情视频.exe
-
Size
11.4MB
-
MD5
ea90ad0eff7026613e7ec2b865606a7c
-
SHA1
ecf19163b425c94cfee2d39c83ee02763a6dd022
-
SHA256
2f1dbad2bc8a6b152996dcb415f01ff0350e75119663914aade45be5beb3f024
-
SHA512
9dd35f881c8dd3c0ace4835c0169c58e247b1d610d6924df5d7d3f0e1839280adc1bfb22c6fad361a9d7b3c79e56fad916cd6fe2e60354db561c6bb545ffc297
-
SSDEEP
12288:/T9t8OedF3+2r2gnz+YJtOsuXUHmT3eSFnOVyFsH:7ofnzTtCJPi
Malware Config
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 少女被干屁眼的唯美肛交色情视频.exe -
Executes dropped EXE 1 IoCs
pid Process 4152 U2YTUM4K.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3364 wrote to memory of 4152 3364 少女被干屁眼的唯美肛交色情视频.exe 85 PID 3364 wrote to memory of 4152 3364 少女被干屁眼的唯美肛交色情视频.exe 85 PID 3364 wrote to memory of 4152 3364 少女被干屁眼的唯美肛交色情视频.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\少女被干屁眼的唯美肛交色情视频.exe"C:\Users\Admin\AppData\Local\Temp\少女被干屁眼的唯美肛交色情视频.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\ProgramData\USOShared\U2YTUM4K.exe"C:\ProgramData\USOShared\U2YTUM4K.exe"2⤵
- Executes dropped EXE
PID:4152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD56f8e78dd0f22b61244bb69827e0dbdc3
SHA11884d9fd265659b6bd66d980ca8b776b40365b87
SHA256a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5
SHA5125611a83616380f55e7b42bb0eef35d65bd43ca5f96bf77f343fc9700e7dfaa7dcf4f6ecbb2349ac9df6ab77edd1051b9b0f7a532859422302549f5b81004632d
-
Filesize
159KB
MD56f8e78dd0f22b61244bb69827e0dbdc3
SHA11884d9fd265659b6bd66d980ca8b776b40365b87
SHA256a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5
SHA5125611a83616380f55e7b42bb0eef35d65bd43ca5f96bf77f343fc9700e7dfaa7dcf4f6ecbb2349ac9df6ab77edd1051b9b0f7a532859422302549f5b81004632d
-
Filesize
159KB
MD56f8e78dd0f22b61244bb69827e0dbdc3
SHA11884d9fd265659b6bd66d980ca8b776b40365b87
SHA256a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5
SHA5125611a83616380f55e7b42bb0eef35d65bd43ca5f96bf77f343fc9700e7dfaa7dcf4f6ecbb2349ac9df6ab77edd1051b9b0f7a532859422302549f5b81004632d