Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 20:11
Behavioral task
behavioral1
Sample
540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe
Resource
win10v2004-20240226-en
General
-
Target
540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe
-
Size
90KB
-
MD5
f11d4e2b9d051c7b717712978b0e285d
-
SHA1
656b00f5e14b5042289266d256b61b9a7d0e31b4
-
SHA256
540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906
-
SHA512
78e0512642184cbb1cabf56f602594b28063a9a7729d3f10d26e7b9c9065f52f556b772454afc14e7b16f91ad1d39563f52c1a9ed1314caa056a3fe838006816
-
SSDEEP
1536:y4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4mf2eMQCV7AyaVKHXnkPuVsElwn5gf:y4X6NSyfnpijeYEoIcq4a2e1CV7AB+3h
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4584-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/files/0x0007000000023207-6.dat upx behavioral2/memory/4584-28-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\password stealer.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\15 year old webcam.mpg.pif 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - xxx nurse scene.mpg.pif 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\hotmailhacker.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Grand theft auto 3 CD1 crack.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - shower scene.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Hotmail Hacker.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Jenna Jamison Dildo Humping.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\divx pro.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Warcraft 3 battle.net serial generator.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\15 year old on beach.mpg.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\winxcfg.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Britney Spears Dance Beat.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\hot girl on the beach sucking cock and fucking guy.mpg.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\siemens unlocker.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\chubby girl bukkake gang banged sucking cock.mpg.pif 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Windows 2000.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\Lolita preteen sex.mpeg.pif 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\yahoo cracker.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe 540f0d30f952ff060fedfd245c90ff8683fab07de6e8ad940574cb4db5307906.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD58ae3edccdc0a910e1155490003041551
SHA1aa313e6c93b2bdfb847e6536c1732195c0d38c41
SHA256c7078d99f657cb8cf1c6a5b2b3495a3b18fef16704e483c68c73ec1c0a61afe8
SHA512c6b7e91472c5ed29d8608fdeea55865e89271dd3e50948f1ab21887c9fe6db03ad2738cae641846c3cd6f91f88915af64ca7574735f6bee88fca3d75f09ae6a6