Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 12:17

General

  • Target

    AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe

  • Size

    284KB

  • MD5

    04142f894c394b262245746d3a9fd3ad

  • SHA1

    368803226a985ff2faf6b02c38fa7f706df49ad1

  • SHA256

    8dd6477fa8e19f220f167310d2961b7c2a223ed46dd883164913fcac480e8350

  • SHA512

    4324a8796baf5a701ff49c1d1361433c49042bc4a67b2708c8f4f16e6c8aa9cc62c6d0b6bd7ca66bbf855b629fb805035f05f78deae48d2baae91f7667a8c711

  • SSDEEP

    6144:5/fUcZlwn55vjiieFHDi+DZUdHDgKhnoUlYN30AUcq7o:CK2n/NeFHDHCDno0YN30AUcq7o

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe
    "C:\Users\Admin\AppData\Local\Temp\AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\ProgramData\wscsvc\wscsvc.exe
      C:\ProgramData\\wscsvc\\wscsvc.exe ,.
      2⤵
      • Executes dropped EXE
      PID:2948
    • C:\Users\Admin\AppData\Local\Temp\AIO Giftcard Generator by Acquire\core.cfg
      core.cfg
      2⤵
        PID:2276
      • C:\ProgramData\wupdater\wupdater.exe
        C:\ProgramData\\wupdater\\wupdater.exe oxKCki3JX16KYwE4FOZZ16IlMmEJaadHkYN07U2aQkSc9WhqWWr5NDRFL57ADtG7
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2400
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2828

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \ProgramData\wscsvc\wscsvc.exe

        Filesize

        275KB

        MD5

        b9352fa2d673bf124116ba9e5639956e

        SHA1

        f511f3b653fc0a7a3e49d1cc58c21c9a53fcf79b

        SHA256

        58a0b8c13f085a3181fecc5d97cdfe5e35892af6b4b31d79657fc88512bb520d

        SHA512

        eea7bd7ff2023e2239b6d5a5ba96d4ecdab4217ecdd6f7403947aa09b1dd54db533bde3b8ef2256cdb720086754c716842bf98810c135b4d72f281dfe5dd48df

      • \ProgramData\wupdater\wupdater.exe

        Filesize

        1.8MB

        MD5

        26f56121184843056f1d6e6db3f9844b

        SHA1

        f8d6c767cab3be5e55608cc5abd30a4c383759e9

        SHA256

        3ad26e1c16b6f49c6136c0c1c02c5943437349a310a6bcc5a8a0f4924a6f4ae4

        SHA512

        13a0898a6780f474ab4ffe8e46ca0227f03f2c4d26daaf4b61862eb7374a65d887b96a8672f21247e7f3aac4c49cce77521dd1564983b52f8716219aff894b9d

      • memory/2276-19-0x0000000180000000-0x0000000180A23000-memory.dmp

        Filesize

        10.1MB

      • memory/2276-30-0x000000013FB4D000-0x000000013FB4E000-memory.dmp

        Filesize

        4KB

      • memory/2276-27-0x0000000001C80000-0x0000000001C93000-memory.dmp

        Filesize

        76KB

      • memory/2276-24-0x0000000000310000-0x0000000000336000-memory.dmp

        Filesize

        152KB

      • memory/2276-21-0x00000000002F0000-0x000000000030A000-memory.dmp

        Filesize

        104KB

      • memory/2276-34-0x0000000001D70000-0x0000000001DB0000-memory.dmp

        Filesize

        256KB

      • memory/2276-31-0x0000000002170000-0x00000000021F2000-memory.dmp

        Filesize

        520KB