Analysis

  • max time kernel
    4s
  • max time network
    6s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 22:15

Errors

Reason
Machine shutdown

General

  • Target

    16 years later!(porn game).exe

  • Size

    24KB

  • MD5

    4a73bb42c7ed13ed4cc86f2dc734a5ce

  • SHA1

    cf08cca49d44629064b24ee72c686611867fd2ac

  • SHA256

    d0dcb9dc5ec78879ac25f613e47642b7eee53f4c0de7a1ef3f4ae18347796e4c

  • SHA512

    faddb62456c2d644ef9b03e91288696f797f2ad51ac36c4ff0a8498b4ba3966d88cd1cc0f6a6172a2d730a979d6176abaa94fcbeef86cb347a5804b64c3bda62

  • SSDEEP

    384:VLpsPHPTmvW8rIpnJSb4daLif3hPLTuDP91sICJbt5j8KoQrJK8DL:1pivD8MMLAIDjR8X

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16 years later!(porn game).exe
    "C:\Users\Admin\AppData\Local\Temp\16 years later!(porn game).exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5700
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\system32\shutdown.exe
        shutdown -s -t 00 -c "blackhost virus maker"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5268
      • C:\Windows\system32\net.exe
        net user Admin *
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 user Admin *
          4⤵
            PID:5000
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3998055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:3684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\cmd.bat

      Filesize

      6KB

      MD5

      50236a84987beb81462ac20440622cac

      SHA1

      6fb2706c323b84b6057fb5cb0149d884e460074c

      SHA256

      90401b6f745d1efc63463a33278004ca1a14383adb776bffa4b422f8888d2a3f

      SHA512

      d5d2822cb01f4843d10e211e80303af293fe4cfb6e853d8e47d08f9fa41332dfaed847de93a0940e1b1563ee61343afe9a5a20874e73d51f8905e99c11fa0045

    • memory/5700-0-0x0000000000040000-0x000000000004C000-memory.dmp

      Filesize

      48KB

    • memory/5700-2-0x00007FFD02710000-0x00007FFD031D1000-memory.dmp

      Filesize

      10.8MB

    • memory/5700-6-0x00007FFD02710000-0x00007FFD031D1000-memory.dmp

      Filesize

      10.8MB