Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 14:41
Behavioral task
behavioral1
Sample
lets have sex.exe
Resource
win7-20240729-en
Errors
General
-
Target
lets have sex.exe
-
Size
55KB
-
MD5
49fe3af39f2e39b36d6519db50f05b5d
-
SHA1
b96571c6056a6542e2e108565724ff6f8f719191
-
SHA256
97d20ed5cc0e56db47810a100458ebc40a9c3ab4f330d3f2e6c46d3df95ee607
-
SHA512
3a3b7385d53d237c0f1b0f313378fef57e06777bb93a426ba6496d74ffca1b2800b6af9d5f82806221dc4fe8bc9f95087208641770d88ba60e0dbf1d7ac5054b
-
SSDEEP
1536:KeksDnHNwZ8Cam8LDdwsNMDbXExI3pmAm:usDn6SKiDdwsNMDbXExI3pm
Malware Config
Signatures
-
Njrat family
-
Drops startup file 35 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus5.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus6.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus7.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus13.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus10.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus11.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus17.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus21.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus33.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus2.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus8.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus15.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus29.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus32.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus18.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus19.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus14.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus35.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus12.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus23.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus24.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus25.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus26.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus27.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus4.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus22.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus28.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus1.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus16.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus31.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus3.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus9.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus20.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus30.bat lets have sex.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\virus34.bat lets have sex.exe -
Executes dropped EXE 13 IoCs
pid Process 1548 0625a2a2e6ca41ee9bf6c3cf76655dcd.exe 344 70b81aa17a084c4ba8e39cba13fe101e.exe 972 7c1fdd5516c948558cc11777fc061043.exe 1088 36db9e2ccbac4de2953ec8443f0f517f.exe 1620 1eed2ff2df63433b84483fc9b06c159a.exe 1152 ce005d93ee724282a6821f8ec6c059dd.exe 316 00f514cf1fd2421e830fed501811aca2.exe 1484 5742712c12164dd4ae7a086bc06693a7.exe 2756 5581e845e2434101bbe4c3f3a81d8256.exe 2656 92216ffeca7141c99469ea42bd76c52b.exe 1564 8699924f6f24446d829625aca8b1c5dc.exe 1736 24e0c8e992094184a32d9cbda9d39aa4.exe 2680 33f19d8337244fce9a42be21a1bb8223.exe -
Loads dropped DLL 13 IoCs
pid Process 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lets have sex.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: SeShutdownPrivilege 2824 shutdown.exe Token: SeRemoteShutdownPrivilege 2824 shutdown.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2200 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2200 AUDIODG.EXE Token: 33 2200 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2200 AUDIODG.EXE Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe Token: 33 2264 lets have sex.exe Token: SeIncBasePriorityPrivilege 2264 lets have sex.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe 2264 lets have sex.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1728 2264 lets have sex.exe 31 PID 2264 wrote to memory of 1728 2264 lets have sex.exe 31 PID 2264 wrote to memory of 1728 2264 lets have sex.exe 31 PID 2264 wrote to memory of 1728 2264 lets have sex.exe 31 PID 1728 wrote to memory of 2824 1728 cmd.exe 33 PID 1728 wrote to memory of 2824 1728 cmd.exe 33 PID 1728 wrote to memory of 2824 1728 cmd.exe 33 PID 1728 wrote to memory of 2824 1728 cmd.exe 33 PID 2264 wrote to memory of 1548 2264 lets have sex.exe 35 PID 2264 wrote to memory of 1548 2264 lets have sex.exe 35 PID 2264 wrote to memory of 1548 2264 lets have sex.exe 35 PID 2264 wrote to memory of 1548 2264 lets have sex.exe 35 PID 2264 wrote to memory of 344 2264 lets have sex.exe 37 PID 2264 wrote to memory of 344 2264 lets have sex.exe 37 PID 2264 wrote to memory of 344 2264 lets have sex.exe 37 PID 2264 wrote to memory of 344 2264 lets have sex.exe 37 PID 2264 wrote to memory of 972 2264 lets have sex.exe 38 PID 2264 wrote to memory of 972 2264 lets have sex.exe 38 PID 2264 wrote to memory of 972 2264 lets have sex.exe 38 PID 2264 wrote to memory of 972 2264 lets have sex.exe 38 PID 2264 wrote to memory of 1088 2264 lets have sex.exe 39 PID 2264 wrote to memory of 1088 2264 lets have sex.exe 39 PID 2264 wrote to memory of 1088 2264 lets have sex.exe 39 PID 2264 wrote to memory of 1088 2264 lets have sex.exe 39 PID 2264 wrote to memory of 1620 2264 lets have sex.exe 40 PID 2264 wrote to memory of 1620 2264 lets have sex.exe 40 PID 2264 wrote to memory of 1620 2264 lets have sex.exe 40 PID 2264 wrote to memory of 1620 2264 lets have sex.exe 40 PID 2264 wrote to memory of 1152 2264 lets have sex.exe 41 PID 2264 wrote to memory of 1152 2264 lets have sex.exe 41 PID 2264 wrote to memory of 1152 2264 lets have sex.exe 41 PID 2264 wrote to memory of 1152 2264 lets have sex.exe 41 PID 2264 wrote to memory of 316 2264 lets have sex.exe 42 PID 2264 wrote to memory of 316 2264 lets have sex.exe 42 PID 2264 wrote to memory of 316 2264 lets have sex.exe 42 PID 2264 wrote to memory of 316 2264 lets have sex.exe 42 PID 2264 wrote to memory of 1484 2264 lets have sex.exe 43 PID 2264 wrote to memory of 1484 2264 lets have sex.exe 43 PID 2264 wrote to memory of 1484 2264 lets have sex.exe 43 PID 2264 wrote to memory of 1484 2264 lets have sex.exe 43 PID 2264 wrote to memory of 2756 2264 lets have sex.exe 44 PID 2264 wrote to memory of 2756 2264 lets have sex.exe 44 PID 2264 wrote to memory of 2756 2264 lets have sex.exe 44 PID 2264 wrote to memory of 2756 2264 lets have sex.exe 44 PID 2264 wrote to memory of 2656 2264 lets have sex.exe 45 PID 2264 wrote to memory of 2656 2264 lets have sex.exe 45 PID 2264 wrote to memory of 2656 2264 lets have sex.exe 45 PID 2264 wrote to memory of 2656 2264 lets have sex.exe 45 PID 2264 wrote to memory of 1564 2264 lets have sex.exe 46 PID 2264 wrote to memory of 1564 2264 lets have sex.exe 46 PID 2264 wrote to memory of 1564 2264 lets have sex.exe 46 PID 2264 wrote to memory of 1564 2264 lets have sex.exe 46 PID 2264 wrote to memory of 1736 2264 lets have sex.exe 47 PID 2264 wrote to memory of 1736 2264 lets have sex.exe 47 PID 2264 wrote to memory of 1736 2264 lets have sex.exe 47 PID 2264 wrote to memory of 1736 2264 lets have sex.exe 47 PID 2264 wrote to memory of 2680 2264 lets have sex.exe 48 PID 2264 wrote to memory of 2680 2264 lets have sex.exe 48 PID 2264 wrote to memory of 2680 2264 lets have sex.exe 48 PID 2264 wrote to memory of 2680 2264 lets have sex.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\lets have sex.exe"C:\Users\Admin\AppData\Local\Temp\lets have sex.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c shutdown /s /f /t 602⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\shutdown.exeshutdown /s /f /t 603⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\0625a2a2e6ca41ee9bf6c3cf76655dcd.exe"C:\Users\Admin\AppData\Local\Temp\0625a2a2e6ca41ee9bf6c3cf76655dcd.exe"2⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\70b81aa17a084c4ba8e39cba13fe101e.exe"C:\Users\Admin\AppData\Local\Temp\70b81aa17a084c4ba8e39cba13fe101e.exe"2⤵
- Executes dropped EXE
PID:344
-
-
C:\Users\Admin\AppData\Local\Temp\7c1fdd5516c948558cc11777fc061043.exe"C:\Users\Admin\AppData\Local\Temp\7c1fdd5516c948558cc11777fc061043.exe"2⤵
- Executes dropped EXE
PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\36db9e2ccbac4de2953ec8443f0f517f.exe"C:\Users\Admin\AppData\Local\Temp\36db9e2ccbac4de2953ec8443f0f517f.exe"2⤵
- Executes dropped EXE
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\1eed2ff2df63433b84483fc9b06c159a.exe"C:\Users\Admin\AppData\Local\Temp\1eed2ff2df63433b84483fc9b06c159a.exe"2⤵
- Executes dropped EXE
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\ce005d93ee724282a6821f8ec6c059dd.exe"C:\Users\Admin\AppData\Local\Temp\ce005d93ee724282a6821f8ec6c059dd.exe"2⤵
- Executes dropped EXE
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\00f514cf1fd2421e830fed501811aca2.exe"C:\Users\Admin\AppData\Local\Temp\00f514cf1fd2421e830fed501811aca2.exe"2⤵
- Executes dropped EXE
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\5742712c12164dd4ae7a086bc06693a7.exe"C:\Users\Admin\AppData\Local\Temp\5742712c12164dd4ae7a086bc06693a7.exe"2⤵
- Executes dropped EXE
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\5581e845e2434101bbe4c3f3a81d8256.exe"C:\Users\Admin\AppData\Local\Temp\5581e845e2434101bbe4c3f3a81d8256.exe"2⤵
- Executes dropped EXE
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\92216ffeca7141c99469ea42bd76c52b.exe"C:\Users\Admin\AppData\Local\Temp\92216ffeca7141c99469ea42bd76c52b.exe"2⤵
- Executes dropped EXE
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\8699924f6f24446d829625aca8b1c5dc.exe"C:\Users\Admin\AppData\Local\Temp\8699924f6f24446d829625aca8b1c5dc.exe"2⤵
- Executes dropped EXE
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\24e0c8e992094184a32d9cbda9d39aa4.exe"C:\Users\Admin\AppData\Local\Temp\24e0c8e992094184a32d9cbda9d39aa4.exe"2⤵
- Executes dropped EXE
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\33f19d8337244fce9a42be21a1bb8223.exe"C:\Users\Admin\AppData\Local\Temp\33f19d8337244fce9a42be21a1bb8223.exe"2⤵
- Executes dropped EXE
PID:2680
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2880
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
961KB
MD54723c3c04794c09bbcb6e03f48440f15
SHA1a5ef69c9dc9eacc2099d9c239146a0e360f1837f
SHA2560d635f035cdb2fd3afda768cd631481ff980957b614a3cf3fca6c592c6c06470
SHA5125b68e1cd3d6bb85b5f449014cc288423faea76ff0ecf8834047dac1ed6e84c4d858a7ed23abe3625d781391f636893736bf5c00474ad0995e75611c1557c5c4a
-
Filesize
844KB
MD58cac1595b184f66d7a122af38d5dfe71
SHA1e0bc0162472edf77a05134e77b540663ac050ab6
SHA25600201a2fd4916193c9c7bbba7be6a77fa5876085480b67da4e1228fd8b23ae5f
SHA51288d3753ce73bbf95ee1fdbdff21eb9331e59ca92cfa5c489f141c07dc90871e3032e331c9dd77b1fec4522add3ac25c51d5c699d7801a5343dd2ae447c60f8f8
-
Filesize
583KB
MD5320b1115164e8b5e1316d86eb29cd299
SHA1bc046d8b14359a7a2bebdecbb819e76c47d84d1b
SHA256d88f5b00da5f05ab7f55fd7c414bb56aaf47e9f51365aaabd71f3ace3cc77523
SHA512fab558cf31aa79caf8e4f6e5649e4e484de3e29bae1386aa61749b70e8c791d74b01fa964501d4755c7688d0420e932f30e36699a2fe4488fae82ee23558afd0
-
Filesize
997KB
MD528aaac578be4ce06cb695e4f927b4302
SHA1880ab0560b81e05e920f9ec1d6c0ecf5e04eaa7e
SHA2568929d3b749ff91527b8e407eff6bde4bb0bb27739313b5c0db0434cbf700dbfc
SHA512068698bda0543c773b36830f6760456e40e9046d9d20089ad88cb646ef5c7bd6c6716c6d59cfc7abd5bffb9129f5a7076e2f9c9b321795f224923f00b7b91374