Analysis
-
max time kernel
102s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 01:20
Behavioral task
behavioral1
Sample
1e9df10864847e7f24d4ccf612856210N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1e9df10864847e7f24d4ccf612856210N.exe
Resource
win10v2004-20240802-en
General
-
Target
1e9df10864847e7f24d4ccf612856210N.exe
-
Size
73KB
-
MD5
1e9df10864847e7f24d4ccf612856210
-
SHA1
d285a1f1e0cfe72119a6505fc841dbb1c97f2c42
-
SHA256
4b54d8dbdd8734a3d8153d5d654cba09dae14c0ea2a6fa84d4b23072aed6f0b4
-
SHA512
02b909bfe1e7a9e40441f04fd17a05176ed62b88151bde2d835722a67e136d057507a31ac8005ee7d3f4797c2734ab106f3983971c4f3031ff2d4615c1c920c3
-
SSDEEP
1536:y4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4m4/2GmwV/wLBd:y4X6NSyfnpijeYEoIcq4tuGZC
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3420-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/files/0x00070000000234a4-6.dat upx behavioral2/memory/3420-28-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 1e9df10864847e7f24d4ccf612856210N.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\Xbox Iso 2 Rom Converter.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Another bang bus victim forced rape sex cum.mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\chubby girl fucked from all angles xxx.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\GTA 3 Serial.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Website Hacker.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\AIM Account Stealer.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\AOL.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Two girls - Blonde and Brunette - Giving head.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - xxx nurse scene.mpg.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - shower scene.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\jenna jameson sex scene huge dick blowjob.scr 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\anastasia nude.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Choke on cum (sodomy, rape).mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\pamela anderson naked.mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\16 year old on beach.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\icqcracker.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\nude.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\aimhacker.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\14 year old on beach.mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\pamela anderson nude.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\illegal porno - 15 year old raped by two men on boat.mpg.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\violent preteen gang bang illegal.mpg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\winxcfg.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Jenna Jamison Dildo Humping.exe 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\fetish bondage preteen porno.mpg.pif 1e9df10864847e7f24d4ccf612856210N.exe File created C:\Windows\SysWOW64\macromd\Digimon.exe 1e9df10864847e7f24d4ccf612856210N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e9df10864847e7f24d4ccf612856210N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD52b6b55f0ac89510c8916231457e8e12b
SHA1fb10af86d17726c3a5185a845f876c242333df37
SHA256312185983861c3f14e7c920329423e55488e155476f1ec3bc0390d7e9f3c151d
SHA512799d49a0a31c78df8a77f4f4000b71e5332a8bbcf6986255748d48c4b1b94b58c7498312b6681afe6ba8882bef16d7c4753c2dbbbbe6537d62c00d0fc80ac683