Analysis
-
max time kernel
2s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 15:01
Behavioral task
behavioral1
Sample
06a1b2a3a6995525663356a4100be5ac.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
06a1b2a3a6995525663356a4100be5ac.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
06a1b2a3a6995525663356a4100be5ac.exe
-
Size
1.1MB
-
MD5
06a1b2a3a6995525663356a4100be5ac
-
SHA1
dcda275295fff790540810e0ca9401bee265bc8b
-
SHA256
3ac14f7e136978496f4cf7f9b2a5d8fda1b589e5b8f08a35a70a011f8cfe54aa
-
SHA512
95644c0e146054a8d93bc2decf9433412eaca45d306f5af798c0c021cfaade00c7a2f3d223f83d8538b2efafdab3b397fa32e0b4cd208ec3e714f8c543530693
-
SSDEEP
24576:604QwB0tWVWx6FjbmCkoqt84c4dzUgYDZVm0LEJGTjbls:BTwmtlYVuoqtxc4zUgEZyQrC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/620-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/files/0x000a000000023126-5.dat upx behavioral2/memory/540-46-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4052-165-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5000-164-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/620-190-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/540-196-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5000-197-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 06a1b2a3a6995525663356a4100be5ac.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\L: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\P: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\U: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\X: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\I: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\J: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\K: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\N: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\O: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\R: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\W: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\Y: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\A: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\B: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\H: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\M: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\S: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\V: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\E: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\Q: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\T: 06a1b2a3a6995525663356a4100be5ac.exe File opened (read-only) \??\Z: 06a1b2a3a6995525663356a4100be5ac.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\indian gang bang bukkake girls cock sweet (Melissa).rar.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\beast full movie .zip.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\danish animal hardcore sleeping hole hotel .rar.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\blowjob catfight cock .mpeg.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Microsoft Office\Updates\Download\fucking [milf] titts balls .rar.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\brasilian fetish hardcore voyeur cock .mpg.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Common Files\microsoft shared\horse full movie shoes .zip.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Microsoft Office\root\Templates\danish action fucking hot (!) mature (Sandy,Jade).avi.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\brasilian horse lingerie voyeur (Melissa).mpeg.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\horse full movie ejaculation .mpeg.exe 06a1b2a3a6995525663356a4100be5ac.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\black handjob horse [bangbus] hole hairy .avi.exe 06a1b2a3a6995525663356a4100be5ac.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\mssrv.exe 06a1b2a3a6995525663356a4100be5ac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"2⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"3⤵PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"C:\Users\Admin\AppData\Local\Temp\06a1b2a3a6995525663356a4100be5ac.exe"2⤵PID:5000
-