Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 01:20
Behavioral task
behavioral1
Sample
1e9df10864847e7f24d4ccf612856210N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1e9df10864847e7f24d4ccf612856210N.exe
Resource
win10v2004-20240802-en
General
-
Target
1e9df10864847e7f24d4ccf612856210N.exe
-
Size
73KB
-
MD5
1e9df10864847e7f24d4ccf612856210
-
SHA1
d285a1f1e0cfe72119a6505fc841dbb1c97f2c42
-
SHA256
4b54d8dbdd8734a3d8153d5d654cba09dae14c0ea2a6fa84d4b23072aed6f0b4
-
SHA512
02b909bfe1e7a9e40441f04fd17a05176ed62b88151bde2d835722a67e136d057507a31ac8005ee7d3f4797c2734ab106f3983971c4f3031ff2d4615c1c920c3
-
SSDEEP
1536:y4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4m4/2GmwV/wLBd:y4X6NSyfnpijeYEoIcq4tuGZC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3068-3-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/files/0x0007000000015d81-6.dat upx behavioral1/memory/3068-28-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 1e9df10864847e7f24d4ccf612856210N.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\Kama Sutra Tetris.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\15 year old webcam.mpg.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\virtua girl - adriana.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\MSN.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\winxcfg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\hotmailhacker.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\chubby girl bukkake gang banged sucking cock.mpg.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\aimhacker.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\pamela anderson naked.mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\jenna jameson sex scene huge dick blowjob.scr 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\illgal incest preteen porn cum.mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\AIM Account Hacker.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Free Porn.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\chubby girl fucked from all angles xxx.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\porn account cracker.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\invisible IP.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - xxx nurse scene.mpg.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Want to see a massive horse cock in a tight little teen's pussy.mpg.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\cute girl giving head.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Universal Game Crack.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Napster Clone.exe 1e9df10864847e7f24d4ccf612856210N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e9df10864847e7f24d4ccf612856210N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5052fdd67dc18a2c0328564ce7f0207b1
SHA19bebafa2d0d3f859b116cec20429c8fbf37e4ee4
SHA2569438485bc42a94697f8bc24b321e979bc0c83694049ea7e0cb924607924b533f
SHA5120a92743d587606097f72caa73d47c4f27a42d70466c8caeee2b4ca3402dc42883c8f1197af61d6ee228982f2a34b2c297711647cf5a9d03441983e2758c1c6fa