Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe
Resource
win10v2004-20240802-en
General
-
Target
bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe
-
Size
9.9MB
-
MD5
98cd1e662396f29805d3730d477f5114
-
SHA1
5e5356e534e8929f10c1be59e2855bf295081be4
-
SHA256
bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0
-
SHA512
0dd4afc3ef50000cf20344e9498f220669a44aa8adab1c576d2ee8e158898f2f12dd515b232186be7a29d6e9a1c6692a31c8c7520196b2d3e16a164cae140056
-
SSDEEP
196608:zfk9DH2OOz6/gN9l6I+J2oywrAzxq2BYBC:7EWOOz6/gR6Oz0Azxq2BYBC
Malware Config
Extracted
raccoon
517bb0d640c1242c3f069aab3d1018d6
http://51.195.166.178/
-
user_agent
TakeMyPainBack
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2716 sdfgfghuytjerh.c.exe 2952 Furry Sex Pirates.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2716 sdfgfghuytjerh.c.exe 2716 sdfgfghuytjerh.c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdfgfghuytjerh.c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2716 sdfgfghuytjerh.c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2716 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe 30 PID 2816 wrote to memory of 2716 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe 30 PID 2816 wrote to memory of 2716 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe 30 PID 2816 wrote to memory of 2716 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe 30 PID 2816 wrote to memory of 2952 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe 31 PID 2816 wrote to memory of 2952 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe 31 PID 2816 wrote to memory of 2952 2816 bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe"C:\Users\Admin\AppData\Local\Temp\bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\sdfgfghuytjerh.c.exe"C:\Users\Admin\AppData\Local\Temp\sdfgfghuytjerh.c.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\Furry Sex Pirates.exe"C:\Users\Admin\AppData\Local\Temp\Furry Sex Pirates.exe"2⤵
- Executes dropped EXE
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD5996134c6e8c16419e191e74617b9a2e5
SHA112ca89f5013d57d5a3728f057678b30afbd083be
SHA2563778794fcbb60a1a0dc85e7d1461cb3a2fbcf623595e361d905772989626a4c8
SHA512109ca15619d91d400fbe0e58b955a74cff494a23268cdca2841bf858fb569fcd8d20a3fe3f2aa58fd6985ac6ffa0ad81524ffbf76233ba711b004415822ff109
-
Filesize
638KB
MD547867a6d97264f1cf939c72df0435165
SHA1c63bf3261a2aec758b115c14df15d20c31e0f838
SHA2564dbcc06c8b9ba975bbca6227f4ae3c737ba979c6c40d6fdb2877d1319b3541cb
SHA512a51ebf1fff3c762ed43039d522eb436f6ff8eb3db04c040f68e77fe3acd80658179723bfe77b447b0df3266b2e1bd9b84fc785b704678b0bf1553e9129339283