Analysis
-
max time kernel
231s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
72eb01c33729e2c9c10db205a12cecc0_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
72eb01c33729e2c9c10db205a12cecc0_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
72eb01c33729e2c9c10db205a12cecc0_exe32.exe
-
Size
290KB
-
MD5
72eb01c33729e2c9c10db205a12cecc0
-
SHA1
a4da9b8cb935450fb3da7e9385e02b2f6f8e671e
-
SHA256
2410b31e007664b9e2470aa6c060c1cfe5736f4db198c30a3555a3ed731d9501
-
SHA512
98c27bfab67488e5b87ec504ce1578ddab2605d462ad0654bae98f4d87e6099326d642350f67d953d68c037a8209d17585c20c82ea89dc35d51696416210d345
-
SSDEEP
6144:dXC4vgmhbIxs3NBR4adk5M8GYuJNprpp8OEzknj+nVZYs8q2:dXCNi9BuWk6dKdknKVZYxq2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 72eb01c33729e2c9c10db205a12cecc0_exe32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 72eb01c33729e2c9c10db205a12cecc0_exe32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 72eb01c33729e2c9c10db205a12cecc0_exe32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\U: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\Y: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\Z: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\G: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\H: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\M: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\T: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\V: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\B: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\N: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\Q: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\S: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\K: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\L: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\O: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\P: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\A: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\E: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\I: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\J: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\W: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File opened (read-only) \??\X: 72eb01c33729e2c9c10db205a12cecc0_exe32.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Download\indian animal gay big .avi.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\italian cumshot blowjob hidden .zip.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files (x86)\Google\Temp\blowjob catfight .mpg.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Common Files\microsoft shared\american gang bang gay full movie castration (Sonja,Curtney).zip.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\swedish cumshot bukkake hidden traffic (Anniston,Samantha).zip.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Microsoft Office\Updates\Download\hardcore several models upskirt (Christine,Karin).mpg.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\black animal horse hot (!) fishy .avi.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\american handjob beast hidden fishy (Sonja,Jade).rar.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\horse sleeping pregnant (Christine,Sarah).avi.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\bukkake girls titts YEâPSè& .mpeg.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\tyrkish fetish blowjob girls cock traffic .rar.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\japanese horse xxx sleeping .avi.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\brasilian handjob lingerie full movie titts castration .zip.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\fucking big blondie (Christine,Melissa).avi.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files (x86)\Microsoft\Temp\bukkake public hole beautyfull .rar.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Microsoft Office\root\Templates\brasilian gang bang lingerie girls feet stockings (Samantha).rar.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\black cumshot hardcore sleeping (Liz).rar.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\mssrv.exe 72eb01c33729e2c9c10db205a12cecc0_exe32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 3348 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 1032 72eb01c33729e2c9c10db205a12cecc0_exe32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4120 wrote to memory of 1372 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 84 PID 4120 wrote to memory of 1372 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 84 PID 4120 wrote to memory of 1372 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 84 PID 4120 wrote to memory of 1032 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 85 PID 4120 wrote to memory of 1032 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 85 PID 4120 wrote to memory of 1032 4120 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 85 PID 1372 wrote to memory of 3348 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 86 PID 1372 wrote to memory of 3348 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 86 PID 1372 wrote to memory of 3348 1372 72eb01c33729e2c9c10db205a12cecc0_exe32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
-
C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\72eb01c33729e2c9c10db205a12cecc0_exe32.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\swedish cumshot bukkake hidden traffic (Anniston,Samantha).zip.exe
Filesize2.0MB
MD5a66e688fb786f63eccd98d769895825d
SHA18400b4a308397495f844977c987ac59cb0832835
SHA256a4168a8e85ab72dab784ade7704058a9a4dd60e6effa85f4fb803fe45c745ccf
SHA512eea1f034333f46a1a67634f4ffd063b281ba98c0e74e2dacc802d481c95cf99654eaa8bee0964d8c6b51d6cc0073a94031eb19a2acf834ab055ea63eb58de6f5