Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 02:37

General

  • Target

    ba1fe8d9cf509c0d00f4dad6283100c7b1c408833fd8f59baf861a6fc70e3d9c.exe

  • Size

    71KB

  • MD5

    8857fade0310032e68058e54ed4410e8

  • SHA1

    5c3f8246946d83bc367ee924778781c46e3d4384

  • SHA256

    ba1fe8d9cf509c0d00f4dad6283100c7b1c408833fd8f59baf861a6fc70e3d9c

  • SHA512

    71d7d027c70a3bfe4d67ed92469c85581c9b1d3348e7d741f7ce0966ee76f52254ffd49f581bc1b9463657fe5f8d5c6f6c0c500760db48d98b4da00df455887e

  • SSDEEP

    1536:Q4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4m/ssuSsWu7qFa+Y:Q4X6NSyfnpijeYEoIcq4AruvWQsaH

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba1fe8d9cf509c0d00f4dad6283100c7b1c408833fd8f59baf861a6fc70e3d9c.exe
    "C:\Users\Admin\AppData\Local\Temp\ba1fe8d9cf509c0d00f4dad6283100c7b1c408833fd8f59baf861a6fc70e3d9c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2904

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\macromd\nikki nova sex scene huge dick blowjob.mpg.exe

          Filesize

          63KB

          MD5

          c3f47888ec874849e270eea3564f9c84

          SHA1

          81406da38f4def127676b69fb59eaf358a4b23cf

          SHA256

          8d737238455ef65aa90d2eb3d30767e0151235b92df8023ea3024e1df8cdc3a1

          SHA512

          e83fca3748206999530ee2f7c9026c8c1bbc593de741aa3c1db3c0a4aa4d48041b186d3f3e7c96ce86e599f3a9daeaf2e44827e4c64fb3c2661fbeb927e216c4

        • memory/2904-0-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB

        • memory/2904-28-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB