Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 10:48
Behavioral task
behavioral1
Sample
c86fc119bac0f770ccbc16a084834473.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c86fc119bac0f770ccbc16a084834473.exe
Resource
win10v2004-20240226-en
General
-
Target
c86fc119bac0f770ccbc16a084834473.exe
-
Size
308KB
-
MD5
c86fc119bac0f770ccbc16a084834473
-
SHA1
2085ee03c7a019660b31a6eb0cabe820b586da4e
-
SHA256
01aa4f2ae47d829d0f2aa30de279c6ff4f8db80f25e382c4155b2594dc734fe4
-
SHA512
def54269961bf7c3c562632fb730784f477ac2395a14031381cf928ef23fed56994aba521330e57ee41d6c23b998a7eda2ddf2b96245c956704b91628f712a61
-
SSDEEP
6144:yfD6q+3voIF2b3P5j+xaw4IjP1FPoE58oqfHDX7TgFE9yQ7hb:rp3vEkxzv71wX7TwE9b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 Gay-Lesbian-Photo.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 c86fc119bac0f770ccbc16a084834473.exe 2240 c86fc119bac0f770ccbc16a084834473.exe -
resource yara_rule behavioral1/memory/2240-0-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral1/files/0x000d00000001231a-5.dat upx behavioral1/memory/2240-7-0x0000000003460000-0x0000000003533000-memory.dmp upx behavioral1/memory/2904-15-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral1/memory/2240-14-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral1/memory/2904-19-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral1/memory/2904-20-0x0000000000400000-0x00000000004D3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pviever = "\"C:\\Program Files\\Gay-Lesbian-Photo\\Gay-Lesbian-Photo.exe\" hide" c86fc119bac0f770ccbc16a084834473.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Gay-Lesbian-Photo\Gay-Lesbian-Photo.exe c86fc119bac0f770ccbc16a084834473.exe File created C:\Program Files\Gay-Lesbian-Photo\uin.txt Gay-Lesbian-Photo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 19 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Gay-Lesbian-Photo.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Gay-Lesbian-Photo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Gay-Lesbian-Photo.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Gay-Lesbian-Photo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Gay-Lesbian-Photo.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Gay-Lesbian-Photo.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Gay-Lesbian-Photo.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Gay-Lesbian-Photo.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Gay-Lesbian-Photo.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Gay-Lesbian-Photo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Gay-Lesbian-Photo.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Gay-Lesbian-Photo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 Gay-Lesbian-Photo.exe 2904 Gay-Lesbian-Photo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2904 2240 c86fc119bac0f770ccbc16a084834473.exe 28 PID 2240 wrote to memory of 2904 2240 c86fc119bac0f770ccbc16a084834473.exe 28 PID 2240 wrote to memory of 2904 2240 c86fc119bac0f770ccbc16a084834473.exe 28 PID 2240 wrote to memory of 2904 2240 c86fc119bac0f770ccbc16a084834473.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c86fc119bac0f770ccbc16a084834473.exe"C:\Users\Admin\AppData\Local\Temp\c86fc119bac0f770ccbc16a084834473.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files\Gay-Lesbian-Photo\Gay-Lesbian-Photo.exe"C:\Program Files\Gay-Lesbian-Photo\Gay-Lesbian-Photo.exe" hide 100002⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5c86fc119bac0f770ccbc16a084834473
SHA12085ee03c7a019660b31a6eb0cabe820b586da4e
SHA25601aa4f2ae47d829d0f2aa30de279c6ff4f8db80f25e382c4155b2594dc734fe4
SHA512def54269961bf7c3c562632fb730784f477ac2395a14031381cf928ef23fed56994aba521330e57ee41d6c23b998a7eda2ddf2b96245c956704b91628f712a61