Analysis
-
max time kernel
21s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:59
Behavioral task
behavioral1
Sample
0332b361019f17cf30ed20279715bca0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0332b361019f17cf30ed20279715bca0N.exe
Resource
win10v2004-20240730-en
General
-
Target
0332b361019f17cf30ed20279715bca0N.exe
-
Size
90KB
-
MD5
0332b361019f17cf30ed20279715bca0
-
SHA1
19cfed25ede5c9e75db5ac90996b8c834edef075
-
SHA256
6c89c3c287dcc5eb6d782ec67be6698cfb5aff371bbf7ba04f12e09c21d09426
-
SHA512
4381220ca033e3a4c6015340f911dfc4501fcabe1c08fc5044842f9036e3d262c4c6526adac5499a2cd340bf63ca4477b73c993d493d85bcdb9b2afeb174898c
-
SSDEEP
1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSiV/iXFEBJLC:5JjcF8KfCOcjk+guPVjSDXFEB4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2352-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/files/0x0009000000016d96-6.dat upx behavioral1/memory/2352-34-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 0332b361019f17cf30ed20279715bca0N.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\two large black bones in a small white box.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\horny little blonde spreading pink.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\horny asian warming her finger in her gash.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\asian getting a taste of pork.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\brazilian supermodel adriana lima.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\hot blonde fucking and sucking cum.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\Microsoft Office XP (english) key generator.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\prego housewifes large hole .mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\password stealer.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\3 teen blonde babes chin deep in pussy sauce.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\busty older bitch gets slammed.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\uptown girl with great ass that should be illegal.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\wife in kitchen preparing hot pussy for hubby's dinner.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\aol password cracker.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\babe with peach shape pussy that needs it bitten.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\cutie nailed up the ass.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\Another bang bus victim forced rape sex cum.mpg.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\two studs gangbanging a hot little sluts holes.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\honie playing in her cunt with newly bought toy.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\tight anal fucking like you want it.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\GTA 3 Crack.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\anastasia nude.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\blonde on couch gettin tight anal fucking.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\pamela anderson naked.mpg.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\tiny little virgin showing off her cherry pussy.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\sunbathing beauties tanning tender pussy lips.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\illegal preteen porn anal fisting.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\Lolita preteen sex.mpeg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson.exe 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\movie of mom who whip hot ass on daughter's big cock lover.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\two teenie boppers learning to eat pussy.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\macromd\couple babes getting off with well hung dude.mpg.pif 0332b361019f17cf30ed20279715bca0N.exe File created C:\Windows\SysWOW64\winxcfg.exe 0332b361019f17cf30ed20279715bca0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0332b361019f17cf30ed20279715bca0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD53c67541a166b50e4beb5e895c8af2c32
SHA12acd34997a0110f2804103b61db02b055413c086
SHA256e2c0b9297eb8c96f3b6f86409501136107a4597062fd8f96c9c9b34de18cf7ff
SHA512d7e0a2f25644dc785488a1a1008540cb958aa7fbc46297c82dbf2ccb7175bbe0216c878227b33db0cfe5201119bb0f6d09edeab9f7a2004085afc082c9853381