Analysis
-
max time kernel
3s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 20:38
Behavioral task
behavioral1
Sample
69dcc0419197a78aaaa22f7fb2656221.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
69dcc0419197a78aaaa22f7fb2656221.exe
Resource
win10v2004-20231215-en
General
-
Target
69dcc0419197a78aaaa22f7fb2656221.exe
-
Size
1.6MB
-
MD5
69dcc0419197a78aaaa22f7fb2656221
-
SHA1
f79b0054fd7bdec3fc64f1dabcd5e28ea585b3cc
-
SHA256
3b9c9e21a7f30b7be69f57174eb88e049bc1d66cf70b8372a18871536b50bef2
-
SHA512
975318ed4362df5c472ffce22463d454bdc7bad3eb71397512cd49866248cc9d68bb0f73205d3401528dfa82d4b8be6790b3f67d47cfed2285869b2962f792dd
-
SSDEEP
24576:NSLzXfXTXa+3N2nNuyZMuXh8q2izf/Jfl0ArIzM85uIU8eX0Pysrjpfl:NwbXZkMgV2ijdPrIzhU8ekaUd
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2916-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2832-6-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/files/0x0007000000016d5d-7.dat upx behavioral1/memory/2832-55-0x0000000004900000-0x000000000491E000-memory.dmp upx behavioral1/memory/2916-95-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2832-97-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 69dcc0419197a78aaaa22f7fb2656221.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\O: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\R: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\S: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\X: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\B: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\E: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\G: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\H: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\U: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\Y: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\I: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\J: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\K: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\P: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\T: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\V: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\W: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\Z: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\A: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\M: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\N: 69dcc0419197a78aaaa22f7fb2656221.exe File opened (read-only) \??\Q: 69dcc0419197a78aaaa22f7fb2656221.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Windows Journal\Templates\tyrkish cumshot beast hidden lady (Sylvia,Sarah).mpg.exe 69dcc0419197a78aaaa22f7fb2656221.exe File created C:\Program Files\Common Files\Microsoft Shared\french kicking voyeur shoes .mpeg.exe 69dcc0419197a78aaaa22f7fb2656221.exe File created C:\Program Files\DVD Maker\Shared\malaysia nude lesbian .rar.exe 69dcc0419197a78aaaa22f7fb2656221.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\mssrv.exe 69dcc0419197a78aaaa22f7fb2656221.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2916 69dcc0419197a78aaaa22f7fb2656221.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2832 2916 69dcc0419197a78aaaa22f7fb2656221.exe 28 PID 2916 wrote to memory of 2832 2916 69dcc0419197a78aaaa22f7fb2656221.exe 28 PID 2916 wrote to memory of 2832 2916 69dcc0419197a78aaaa22f7fb2656221.exe 28 PID 2916 wrote to memory of 2832 2916 69dcc0419197a78aaaa22f7fb2656221.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\69dcc0419197a78aaaa22f7fb2656221.exe"C:\Users\Admin\AppData\Local\Temp\69dcc0419197a78aaaa22f7fb2656221.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\69dcc0419197a78aaaa22f7fb2656221.exe"C:\Users\Admin\AppData\Local\Temp\69dcc0419197a78aaaa22f7fb2656221.exe"2⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\69dcc0419197a78aaaa22f7fb2656221.exe"C:\Users\Admin\AppData\Local\Temp\69dcc0419197a78aaaa22f7fb2656221.exe"3⤵PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dd766813048c50688a3264898fb546cc
SHA1cca5b28ed0f0cd1a5225486958e86f48fcb20ca3
SHA256fa5d45cb965c29e7a07a5f4714591d7469a87b0637b2c9648b89a23499af70fd
SHA51285893deff357602777ff81209336eb448b9dffa353a232b9dbc61fba78bd66bdfbbfb4c42798ca3c28a52aa3563fc0e446fa4679ef6f70068f7af8958af6ba14