Analysis
-
max time kernel
13s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 06:00
Behavioral task
behavioral1
Sample
39a79e68435c0e487e99e727e7918bae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39a79e68435c0e487e99e727e7918bae.exe
Resource
win10v2004-20240226-en
General
-
Target
39a79e68435c0e487e99e727e7918bae.exe
-
Size
90KB
-
MD5
39a79e68435c0e487e99e727e7918bae
-
SHA1
4855d97d42a063205a34a33778b61d17312ce454
-
SHA256
7b0811ba18d45d75a18de9bc7baef821995e12c4e27213072fc52b106fd81a71
-
SHA512
758456489be515a6d772b8be36b6291f63ce01dd7fb5f3cd3dd2877ca4d6b1c43f257e839d86954d544f7216cdaca87f6ee1f8a9082019528266a4b102be9cb0
-
SSDEEP
1536:y4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4m0GVQ3N5UOuPClmxuRPsHG9abBp/Z3C:y4X6NSyfnpijeYEoIcq4Ci/MuRV9yRZS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2668-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/files/0x0009000000018b77-6.dat upx behavioral1/memory/2668-28-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 39a79e68435c0e487e99e727e7918bae.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\yahoo cracker.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\girls gone wild.mpg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\aimcracker.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\virtua girl - adriana.pif 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\16 year old webcam.mpg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Want to see a massive horse cock in a tight little teen's pussy.mpg.pif 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\preteen snuff sex rape with a stick hardcore.mpg.pif 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\illegal porno - 15 year old raped by two men on boat.mpg.pif 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\pamela anderson naked.mpg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\play station emulator crack.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Hotmail Hacker.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\chubby girl bukkake gang banged sucking cock.mpg.pif 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\winxcfg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Choke on cum (sodomy, rape).mpg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Britney spears nude.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\15 year old on beach.mpg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\invisible IP.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Universal Game Crack.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\CKY3 - Bam Margera World Industries Alien Workshop.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Blonde and Japanese girl bukkake.mpg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\icqcracker.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Jenna Jamison Dildo Humping.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe 39a79e68435c0e487e99e727e7918bae.exe File created C:\Windows\SysWOW64\macromd\Microsoft Office XP (english) key generator.exe 39a79e68435c0e487e99e727e7918bae.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD52ebc1aa37193d5ebf5f26137a409432a
SHA15fa1e4233ef69750f0a01f1ca7e8ac8b134b9b03
SHA256597822845ec6da330d92b2e0f9dd59920d03ed5305c3d62462389d3866651748
SHA5124fe1c299ac10ac54b592f447881efd6892282dfe696f6c07b1b6e08ef2db5044b7b8bd7c7bab6cff2b23af58dd25ca4886a9c242be0c96ff3c73344cae470c11