Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07-06-2024 23:27
Behavioral task
behavioral1
Sample
my_penis_is_hard.lol.exe
Resource
win10-20240404-en
General
-
Target
my_penis_is_hard.lol.exe
-
Size
903KB
-
MD5
2ddc3374433159b00c6a9e5f43e2cd82
-
SHA1
b712be05de623818c6ed708500dc35f225155e59
-
SHA256
515127d9f53fa203f3ba9cb7b7b4d1cda211294cd80254cb9954e3d7462d309f
-
SHA512
a7d9367e553476bfe9d43bb28add4f70d7e115f4575664f2d903a544c685b2c3a2d26d5279fdd873f71ccb81fcb7b6f39791216262d1326f1043ced49cd9da9c
-
SSDEEP
12288:JTUZ/Y95eo6L4ce7dG1lFlWcYT70pxnnaaoawalBa2Ley+trZNrI0AilFEvxHvB3:JqI4MROxnF7ay6rZlI0AilFEvxHiAl
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini my_penis_is_hard.lol.exe File opened for modification C:\Windows\assembly\Desktop.ini my_penis_is_hard.lol.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini my_penis_is_hard.lol.exe File opened for modification C:\Windows\assembly my_penis_is_hard.lol.exe File created C:\Windows\assembly\Desktop.ini my_penis_is_hard.lol.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4024 my_penis_is_hard.lol.exe Token: 33 4332 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4332 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3604 4024 my_penis_is_hard.lol.exe 73 PID 4024 wrote to memory of 3604 4024 my_penis_is_hard.lol.exe 73 PID 3604 wrote to memory of 1064 3604 csc.exe 75 PID 3604 wrote to memory of 1064 3604 csc.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\my_penis_is_hard.lol.exe"C:\Users\Admin\AppData\Local\Temp\my_penis_is_hard.lol.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\85zjhokf.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60DE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC60DD.tmp"3⤵PID:1064
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4101⤵
- Suspicious use of AdjustPrivilegeToken
PID:4332
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5dd2955c94d6d6d9ee497c0c45cd99dc0
SHA125fc5765dff40e6b46626639ef35d8c5c72446fb
SHA2562aefdc24ce357cdfe98d8cad4beff1f77d512adb96055c695a82737064041f35
SHA512c16e68414bd296e0e3cf1596d871f358f066ad18f1fa9c8d52b3456739a7b181f9b7783b266498d572fa968e75bee8cc10976a73f820ffd70d974d7e3ef4c984
-
Filesize
1KB
MD5f6e154e42ca2126552539a26d13cc768
SHA13a3e2e8f1f8e1adddf60da14db19e7e68bddb2d9
SHA256fe7ae317949859d16d3dc4fb09b725dbbd9d3c026b57015b1532f0a123dbe78b
SHA51275d9e1c46b32663408fbc23bf0f5d248de00c5a6a0aae90fa01dba18d88ee8ee9173b0102b690ddbd1909597365ce904fd5daff72641b5e7fcffa4830742a202
-
Filesize
208KB
MD5726674f5b8f25dd6b8b529bb84907171
SHA105244fddd8749d7cf704867138babf4156bec6ec
SHA256deefcf8b9f1668bfb2ab66983019ba672cb1f33b4bec1afd806bd8d0cb7d1abd
SHA5123d20a78aee8f9cb2f3bc549ac32039b66f2af713b84eb334ff52301f34b16d8b91d30097ff9b8ccbb1dddde35522b3794b3176943fd70f529352491f958ee14b
-
Filesize
349B
MD50295dd51356bcf08a3872b54b5a710fe
SHA1538cb49665cc22849e98f9db8f39856bd29db8b0
SHA2562c32117443c1e42f0511455a275da81ea4cd9d01a8c3d4383e2a9d36007b48ad
SHA512a3e9449ecaffa4e74215419dbd0054985cfcd0253a4816e6e96afc84779b70f7941c1760edc68d0d99daa83422de92df86d6558fad390afb5fbc0e9226542e86
-
Filesize
676B
MD5a72895a288b8e1a2ad9d962b8cbcf71c
SHA15ede5cb88ca03ce9d00de3954e9e8d60ad2e12e8
SHA25695eb685865e3bf6e5409175f20b2f79d1286e3a66a76ceef1364ac651d56c04a
SHA5123e17359688d74d5bf3a830c98ea62fc74b99687cc54eda02c583cf4a9bbb759dd92e8f53b69411ae93a708b90cdabe616e6e522840dbaff320148013ccde6dc0