Analysis
-
max time kernel
1s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2024 16:06
Behavioral task
behavioral1
Sample
ac0a50d55d1080fadbe3df0faff09e71.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ac0a50d55d1080fadbe3df0faff09e71.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
ac0a50d55d1080fadbe3df0faff09e71.exe
-
Size
1.8MB
-
MD5
ac0a50d55d1080fadbe3df0faff09e71
-
SHA1
17eeeea53a8af3504b22749eadd9f25098bdd52c
-
SHA256
59778d97cdaaf58ab111f4dc8c6b00ffbf60562c3eb55220acc95297f301e529
-
SHA512
2684c545ef65d8a47259c2cada50bb6a34de82a72e9555e71a7ebc8bb994d452b2ee4a150d19ec4b177d33e9a447effb9187b18a0fdaadff7ccd952d90333c0b
-
SSDEEP
49152:suEyV4AeWfS7APwmQhFXdnnkv40dW0qWS6S2Y:sgV4AeWa7XrN/PZwY
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1268-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4452-40-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/364-162-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/364-193-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" ac0a50d55d1080fadbe3df0faff09e71.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\I: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\L: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\N: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\P: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\X: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\O: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\R: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\S: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\E: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\G: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\H: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\J: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\M: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\T: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\W: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\A: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\K: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\Q: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\U: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\Z: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\B: ac0a50d55d1080fadbe3df0faff09e71.exe File opened (read-only) \??\V: ac0a50d55d1080fadbe3df0faff09e71.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Updates\Download\horse voyeur feet mature .rar.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\danish fetish hardcore several models .zip.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\chinese sperm public titts sweet (Karin).mpg.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\Common Files\microsoft shared\swedish fetish bukkake masturbation (Liz).mpeg.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\dotnet\shared\italian gang bang blowjob hot (!) cock YEâPSè& .rar.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\italian beastiality gay sleeping feet .zip.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\american beastiality lingerie public .rar.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\xxx girls (Sarah).rar.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\Microsoft Office\root\Templates\cumshot horse sleeping titts .rar.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian cumshot fucking girls castration .rar.exe ac0a50d55d1080fadbe3df0faff09e71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\hardcore licking titts .mpeg.exe ac0a50d55d1080fadbe3df0faff09e71.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\mssrv.exe ac0a50d55d1080fadbe3df0faff09e71.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac0a50d55d1080fadbe3df0faff09e71.exe"C:\Users\Admin\AppData\Local\Temp\ac0a50d55d1080fadbe3df0faff09e71.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\ac0a50d55d1080fadbe3df0faff09e71.exe"C:\Users\Admin\AppData\Local\Temp\ac0a50d55d1080fadbe3df0faff09e71.exe"2⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\ac0a50d55d1080fadbe3df0faff09e71.exe"C:\Users\Admin\AppData\Local\Temp\ac0a50d55d1080fadbe3df0faff09e71.exe"3⤵PID:364
-
-