Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/11/2024, 08:23
Behavioral task
behavioral1
Sample
b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe
Resource
win10v2004-20241007-en
General
-
Target
b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe
-
Size
74KB
-
MD5
95a3cf12e2f420b9a1c1b4389b59ab3e
-
SHA1
015e7e784a9dab8a47ea4d663f2d47ce66e69805
-
SHA256
b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2
-
SHA512
30decd379970ff1405b7e7fc011b2aed3a26582d83a59d770a909116df7b84d4ff1a08557280063e03d8276aa952ccd42136c08e42585f9d1a0112c23b1c6a9e
-
SSDEEP
1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSM8sug6hDW2PMg:5JjcF8KfCOcjk+guPVjSM8s1Z2PMg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\Britney spears nude.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\password stealer.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\nasty teen posing in panties.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\hot anal sex for the first time ever.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\super sexy blonde showing her pink.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\slut mouth open wide to take dick in.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\holes fisting to the breaking point.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\winxcfg.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\aimhacker.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\hot tomoli lathering up sexy body for boyfriend's tongue.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\extremely fine hoine with incredible sweet twat.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\lusty teen peeing in backyard.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\Website Hacker.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\AOL.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\stud fucking his blonde french maid.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\preteen snuff sex rape with a stick hardcore.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\AIM Flooder.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\an older fat mom spreading wide.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\babes with an assortment of delicious big juggs.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\hot babe showing her pussy and wanting a stiff cock.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - xxx nurse scene.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\Digimon.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\aol password cracker.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\MSN.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\fun slut who let dude eat her off in jacuzzi.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\horny ass licking lesbians.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\15 year old webcam.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\Napster Clone.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\warcraft 3 crack.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\young teen slut with a huge cock in her mouth.mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\girls with cock in hand and mouths fill with cum .mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\pornstar aria giovanni .mpg.pif b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe File created C:\Windows\SysWOW64\macromd\15 year old on beach.mpg.exe b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe -
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/files/0x0008000000019613-6.dat upx behavioral1/memory/2104-34-0x0000000000400000-0x0000000000467000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe"C:\Users\Admin\AppData\Local\Temp\b904ae346e3e732e2907322b35fdc731d617ee4d12f9696ec77154ae730e71f2.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5e65e75648394962dbdfde3edfecc6298
SHA134473455fc4e322dd1bcee04fac40bb6e1beaa87
SHA25611196c4273438575750cfadd524314428c006d0632c10f91190b4b5bfde73fed
SHA51269f3abda9b9fc0de65987685c7fd89a4ad5e3a65d32bafe7c296832e6ecc1195e511ac187b793d6b31198c7e86e122cdc8bfe419a06a24e635db2e4740939e84