Analysis

  • max time kernel
    3s
  • max time network
    4s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 22:15

Errors

Reason
Machine shutdown

General

  • Target

    16 years later!(porn game).exe

  • Size

    24KB

  • MD5

    4a73bb42c7ed13ed4cc86f2dc734a5ce

  • SHA1

    cf08cca49d44629064b24ee72c686611867fd2ac

  • SHA256

    d0dcb9dc5ec78879ac25f613e47642b7eee53f4c0de7a1ef3f4ae18347796e4c

  • SHA512

    faddb62456c2d644ef9b03e91288696f797f2ad51ac36c4ff0a8498b4ba3966d88cd1cc0f6a6172a2d730a979d6176abaa94fcbeef86cb347a5804b64c3bda62

  • SSDEEP

    384:VLpsPHPTmvW8rIpnJSb4daLif3hPLTuDP91sICJbt5j8KoQrJK8DL:1pivD8MMLAIDjR8X

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16 years later!(porn game).exe
    "C:\Users\Admin\AppData\Local\Temp\16 years later!(porn game).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\system32\shutdown.exe
        shutdown -s -t 00 -c "blackhost virus maker"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
      • C:\Windows\system32\net.exe
        net user Admin *
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 user Admin *
          4⤵
            PID:2884
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:2568
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:1368

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\cmd.bat

          Filesize

          6KB

          MD5

          50236a84987beb81462ac20440622cac

          SHA1

          6fb2706c323b84b6057fb5cb0149d884e460074c

          SHA256

          90401b6f745d1efc63463a33278004ca1a14383adb776bffa4b422f8888d2a3f

          SHA512

          d5d2822cb01f4843d10e211e80303af293fe4cfb6e853d8e47d08f9fa41332dfaed847de93a0940e1b1563ee61343afe9a5a20874e73d51f8905e99c11fa0045

        • memory/1368-13-0x0000000002B30000-0x0000000002B31000-memory.dmp

          Filesize

          4KB

        • memory/2268-0-0x00000000000B0000-0x00000000000BC000-memory.dmp

          Filesize

          48KB

        • memory/2268-2-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

          Filesize

          9.9MB

        • memory/2268-11-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

          Filesize

          9.9MB

        • memory/2568-12-0x0000000002D90000-0x0000000002D91000-memory.dmp

          Filesize

          4KB