Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
b86f4471af6d142f17537a9d5075197e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b86f4471af6d142f17537a9d5075197e.exe
Resource
win10v2004-20240226-en
General
-
Target
b86f4471af6d142f17537a9d5075197e.exe
-
Size
2.6MB
-
MD5
b86f4471af6d142f17537a9d5075197e
-
SHA1
bc0c407e9778c474a1431da5a041d8faa0b97411
-
SHA256
01b99ec6a0a57d75cf9b7993c67776dfe5f6dcdf3cf1b0460b41fc8780ce5a57
-
SHA512
078a60d6ecaa6a1974abd2236e667bc90724e79cfbc59776e38dab06a441be6085015e5a4bb52002a08b3a9726404e3349a2fbbe84e5bb74b2014b4a8370b09e
-
SSDEEP
49152:++fqs1p1m26U6SidllwJF4N67KRTMw9Ld1MtG4pLVRtTCWVxV+k6ouq:++ft1p1B6U6Vi4aEH98UyxTCWVxV+k6I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4340 sexyss59.exe_tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Mandy Moore Sex-E Screensaver Uninstaller.exe b86f4471af6d142f17537a9d5075197e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4340 3344 b86f4471af6d142f17537a9d5075197e.exe 89 PID 3344 wrote to memory of 4340 3344 b86f4471af6d142f17537a9d5075197e.exe 89 PID 3344 wrote to memory of 4340 3344 b86f4471af6d142f17537a9d5075197e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b86f4471af6d142f17537a9d5075197e.exe"C:\Users\Admin\AppData\Local\Temp\b86f4471af6d142f17537a9d5075197e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\inst240615593\installer\sexyss59.exe_tmp.exe"C:\Users\Admin\AppData\Local\Temp\inst240615593\installer\sexyss59.exe_tmp.exe"2⤵
- Executes dropped EXE
PID:4340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5aabc2bbc97e9cb7c85f5bb3d37ebd3d3
SHA1cda4982eb153462aa7df2c63c78f73710370b7a2
SHA25689a934a6eb7041b060a75553f29dfca2ba0326f7a7112765c0d985f631ea1b57
SHA5127bdda69bcca41ce8b275010fcefd68ca82dbd4ecd3795b449cb0618129ae8a475208ef411fe9e9aa6ac5656a7f98afada04aeecb5780e525100ec1ad0cf743b2