Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 02:29

General

  • Target

    3ea00d191fdf414e8538dc0aa40862a0N.exe

  • Size

    80KB

  • MD5

    3ea00d191fdf414e8538dc0aa40862a0

  • SHA1

    18a5717bbb0b05c2385255a4126222267adfc9b1

  • SHA256

    67b3ea4edf5fb6359b953cb6017db0bd943f4934d7cffa0238b58edd4572012f

  • SHA512

    9376a6c6342664c6b3879831d2ab7e03b3f28e4ab6cd2bda6adf3acc3df3a2032084a743da3466527f7dd88bac2ba2dbba5f455a7c5a4ee605e29c4b5afe34c1

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSWGcxrmcMqD3O:5JjcF8KfCOcjk+guPVjSWGcxpz6

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ea00d191fdf414e8538dc0aa40862a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ea00d191fdf414e8538dc0aa40862a0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:4684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\jenna jameson sex scene huge dick blowjob.scr

    Filesize

    92KB

    MD5

    53471e20fddf0f6d32212c53b06fed54

    SHA1

    624ca29f6bb3b42f2505f31e95b5644d218f958a

    SHA256

    c6ad48b8dce56756c21c7aefaf231c1da18f642acfedcff565b564755463189d

    SHA512

    bef99b968de20cd866fbbcb017b5ba94f1f3c8d14bcd8f814bb93c2bb37f4c64f8220aca6436975d634c89f66f380282a5148c43412c03118466f0276027d491

  • memory/4684-0-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4684-34-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB