Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 16:41
Behavioral task
behavioral1
Sample
b0bcb5f699a6dbcf06842d0d9c6947a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0bcb5f699a6dbcf06842d0d9c6947a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b0bcb5f699a6dbcf06842d0d9c6947a0N.exe
-
Size
79KB
-
MD5
b0bcb5f699a6dbcf06842d0d9c6947a0
-
SHA1
157ad3356b2c312dad3e0e08d84e7776440185d2
-
SHA256
28559cb8666951a798894c25618cf5cfef8fcf87a5df36e5a8108405a022ecd6
-
SHA512
a47fdd2a5ba93d1b72e35d3fe93c4e5157746d8a2f9eba455df7e5f33bc7b826a9effcd6c1a5f17bc8fe412b508e7933b31331ea1970ee52b82cb60d22f050aa
-
SSDEEP
1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSVWc1OEbsgmWb1H6eG:5JjcF8KfCOcjk+guPVjSVWCssb1H5G
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1148-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/files/0x00070000000235cc-6.dat upx behavioral2/memory/1148-34-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" b0bcb5f699a6dbcf06842d0d9c6947a0N.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\kill osama bin laden game.exe b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\warcraft 3 crack.exe b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\sexy hot teens gettin busy in shower.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\bottle blonde tramp sucking a dick dry.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\career girls playing with their snatch after work.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\kitty-cat with horny beaver that needs licking.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\two interracial lesbians licking each other.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\hard cock cumming in her mouth.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\pornstar aria giovanni .mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\cock forced in some slut mouth.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\extremely fine hoine with incredible sweet twat.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\japanes girl getting it from behind.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\Play Games Online For FREE.exe b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\movie of mom who whip hot ass on daughter's big cock lover.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\tiny little virgin showing off her cherry pussy.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\hot tomoli lathering up sexy body for boyfriend's tongue.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\hot mature blonde in stockings.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\hot slut with a big dildo.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\babes letting dudes assault their furballs.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\nasty teen posing in panties.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\winxcfg.exe b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\twink stroking his butt plugger.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\busty older bitch gets slammed.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\uptown girl with great ass that should be illegal.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\nikki nova sex scene huge dick blowjob.mpg.exe b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\Britney spears nude.exe b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\babes taking turns munching on hot beavers.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\honie with thick ass spreading her money maker.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\two kinky old lezbos snapping the whip.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\amateur spreading more fine ass than stud can handle.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\shanks who serve up smelly pootang.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe File created C:\Windows\SysWOW64\macromd\hot teeny sucking cock.mpg.pif b0bcb5f699a6dbcf06842d0d9c6947a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0bcb5f699a6dbcf06842d0d9c6947a0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0bcb5f699a6dbcf06842d0d9c6947a0N.exe"C:\Users\Admin\AppData\Local\Temp\b0bcb5f699a6dbcf06842d0d9c6947a0N.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3864 /prefetch:81⤵PID:3632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD551c5c5df6f5f6946b72b8d9d6fe51f7f
SHA1083387e890b559a74d45fdaaa0c7d4047cd8e6b5
SHA25694ef5f2847a244bc6b2580ca51245e46278ed5a763a6151ccc4a60e759fe178b
SHA5123da4157185b5ae66613a427b871379e8ed09d308e36c66ebd64c9edbe2a9628d0ce7d5f0f7b67c045540789568cc816e7699e56fe611befb4c6d8085387b8faa