Analysis
-
max time kernel
4s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
16 years later!(porn game).exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16 years later!(porn game).exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
16 years later!(porn game).exe
-
Size
24KB
-
MD5
4a73bb42c7ed13ed4cc86f2dc734a5ce
-
SHA1
cf08cca49d44629064b24ee72c686611867fd2ac
-
SHA256
d0dcb9dc5ec78879ac25f613e47642b7eee53f4c0de7a1ef3f4ae18347796e4c
-
SHA512
faddb62456c2d644ef9b03e91288696f797f2ad51ac36c4ff0a8498b4ba3966d88cd1cc0f6a6172a2d730a979d6176abaa94fcbeef86cb347a5804b64c3bda62
-
SSDEEP
384:VLpsPHPTmvW8rIpnJSb4daLif3hPLTuDP91sICJbt5j8KoQrJK8DL:1pivD8MMLAIDjR8X
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 16 years later!(porn game).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "69" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 5268 shutdown.exe Token: SeRemoteShutdownPrivilege 5268 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3684 LogonUI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5700 wrote to memory of 4292 5700 16 years later!(porn game).exe 86 PID 5700 wrote to memory of 4292 5700 16 years later!(porn game).exe 86 PID 4292 wrote to memory of 5268 4292 cmd.exe 87 PID 4292 wrote to memory of 5268 4292 cmd.exe 87 PID 4292 wrote to memory of 3484 4292 cmd.exe 88 PID 4292 wrote to memory of 3484 4292 cmd.exe 88 PID 3484 wrote to memory of 5000 3484 net.exe 90 PID 3484 wrote to memory of 5000 3484 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\16 years later!(porn game).exe"C:\Users\Admin\AppData\Local\Temp\16 years later!(porn game).exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\system32\shutdown.exeshutdown -s -t 00 -c "blackhost virus maker"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5268
-
-
C:\Windows\system32\net.exenet user Admin *3⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin *4⤵PID:5000
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3998055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD550236a84987beb81462ac20440622cac
SHA16fb2706c323b84b6057fb5cb0149d884e460074c
SHA25690401b6f745d1efc63463a33278004ca1a14383adb776bffa4b422f8888d2a3f
SHA512d5d2822cb01f4843d10e211e80303af293fe4cfb6e853d8e47d08f9fa41332dfaed847de93a0940e1b1563ee61343afe9a5a20874e73d51f8905e99c11fa0045