Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 20:21
Behavioral task
behavioral1
Sample
NSFW Generator/NSFWGEN.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NSFW Generator/NSFWGEN.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
NSFW Generator/start.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
NSFW Generator/start.bat
Resource
win10v2004-20240221-en
General
-
Target
NSFW Generator/NSFWGEN.exe
-
Size
13.8MB
-
MD5
638d136547ece9e4f282d62aa6562a07
-
SHA1
19ba1d25332fac7c3fe7bf0eae2ad3520fded5db
-
SHA256
d7407d5dd0dca80aa9798ff6aaa10635474feab533b7e6db87d759abf69f1ee8
-
SHA512
e1c2f4a6ffff124c5a7cece7a48be026f1098708376f3e03d46f2e8a0f35e05d223da05b78ef3417422d62ce9feaa137241b0f879b731f63b2c1cbaafebc3323
-
SSDEEP
393216:hiIE7Yo5D2nwW+eGQRIMTozGxu8C0ibfz6e57F1bmXdWCNx+:O7r5DawW+e5R5oztZ026e5XkVN4
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2420 NSFWGEN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2420 2988 NSFWGEN.exe 1 PID 2988 wrote to memory of 2420 2988 NSFWGEN.exe 1 PID 2988 wrote to memory of 2420 2988 NSFWGEN.exe 1
Processes
-
C:\Users\Admin\AppData\Local\Temp\NSFW Generator\NSFWGEN.exe"C:\Users\Admin\AppData\Local\Temp\NSFW Generator\NSFWGEN.exe"1⤵
- Loads dropped DLL
PID:2420
-
C:\Users\Admin\AppData\Local\Temp\NSFW Generator\NSFWGEN.exe"C:\Users\Admin\AppData\Local\Temp\NSFW Generator\NSFWGEN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5ea4096bec636d70838ca02f1226db40c
SHA1e659d3516f3b1b3a3d1767107b738c82b0ce1e04
SHA2569fd9c7d28df6f16239e04de4ecfdbe752893161a6c6da640d528b0110eab7bb0
SHA512ad1cc3861f4a35de1f7883925aa4571299fd529e97a19962024c6d7120e7b16ae057f10151934253b9f38d2038874ce89243cddf1cbdd15e5787b7df2843ade5
-
Filesize
799KB
MD5f54670d9c74b6f43ebce1333aacf6261
SHA1736ec4e637c6b9a0c4372a20296f5766d6338cea
SHA2560388d3354cf38f99847f31b82df8d861d8d3bf72b9c751cdeeee44f44547705c
SHA5123dda408b802f1589e86072ccc9e99533028988c4c55636195a4ee1183b88c55f6c1fdd50dc2259985ca9c8ab27d1e4f574a913431c8da3131b76cb4ce21bd479