Analysis
-
max time kernel
169s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:44
Static task
static1
Behavioral task
behavioral1
Sample
1d71a768c8b20225a3cb39c77ee15f3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d71a768c8b20225a3cb39c77ee15f3e.exe
Resource
win10v2004-20231215-en
General
-
Target
1d71a768c8b20225a3cb39c77ee15f3e.exe
-
Size
643KB
-
MD5
1d71a768c8b20225a3cb39c77ee15f3e
-
SHA1
fa083383a06c3ab4c58d0d0e236b473cc82b2016
-
SHA256
f5f2d334a2039f3fce0313a64bc862ffb0f4777abf9355efb844917cd9038fea
-
SHA512
39b064625af416c0318a65ccf49108d1a8f505e031c4a4faf1f4e9a6fe7c82a465c61d447d3e566d6abf8e9883374bc51e0ffb8038db98bf450dd1210bf2f344
-
SSDEEP
12288:jXXi9B73c1sTOgSVAYT9NrWrYJA5w4LkLPyj715k66gTNmVIWFfM3ltNdyTMIIp8:DY73cOhSrT9NMBw4LzvhJThWFylHdyTN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1d71a768c8b20225a3cb39c77ee15f3e.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1d71a768c8b20225a3cb39c77ee15f3e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 1d71a768c8b20225a3cb39c77ee15f3e.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\Y: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\K: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\L: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\M: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\N: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\P: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\R: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\V: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\A: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\B: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\G: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\H: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\J: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\O: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\Q: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\U: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\X: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\Z: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\I: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\S: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\T: 1d71a768c8b20225a3cb39c77ee15f3e.exe File opened (read-only) \??\W: 1d71a768c8b20225a3cb39c77ee15f3e.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Shared Gadgets\indian animal sperm voyeur cock shoes (Jade).rar.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\blowjob full movie (Sarah).zip.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\dotnet\shared\swedish cumshot beast hot (!) pregnant .rar.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian fetish lesbian lesbian ΋ .mpg.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\blowjob [milf] sm .zip.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\black handjob fucking public black hairunshaved .zip.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\Microsoft Office\Updates\Download\horse [free] titts (Jenna,Melissa).mpeg.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\Common Files\microsoft shared\horse [free] pregnant .zip.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\Microsoft Office\root\Templates\italian cum bukkake voyeur femdom .mpeg.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\tyrkish beastiality bukkake catfight hotel .avi.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\mssrv.exe 1d71a768c8b20225a3cb39c77ee15f3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 4932 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe 3668 1d71a768c8b20225a3cb39c77ee15f3e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3332 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 95 PID 3940 wrote to memory of 3332 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 95 PID 3940 wrote to memory of 3332 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 95 PID 3940 wrote to memory of 3668 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 96 PID 3940 wrote to memory of 3668 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 96 PID 3940 wrote to memory of 3668 3940 1d71a768c8b20225a3cb39c77ee15f3e.exe 96 PID 3332 wrote to memory of 4932 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 97 PID 3332 wrote to memory of 4932 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 97 PID 3332 wrote to memory of 4932 3332 1d71a768c8b20225a3cb39c77ee15f3e.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"C:\Users\Admin\AppData\Local\Temp\1d71a768c8b20225a3cb39c77ee15f3e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\blowjob [milf] sm .zip.exe
Filesize1.2MB
MD5bf042f5a59792f9af8678ee7b32ae350
SHA1de6eb3613d4abce761268c74a8a3b37b6d42f5ee
SHA256043c77627fd9e3b34f7f56420f85f31dafb617eb8e6327a070367bbd29f419d5
SHA5129fef41075dc3683067a8da44e04b9d44c4345658330258064c90bef70f49880d83d926cba77294b9df36f0b75dad61462bdba7a81731cf1692beb6886e2850ff