Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 12:17

General

  • Target

    Combo Editor Sexitor by Calina\Sexitor.exe

  • Size

    218KB

  • MD5

    30b901d912687b60320d97fb916afd3d

  • SHA1

    704cba332df8d48eeee9263b880773b806a4eb83

  • SHA256

    6966e27f091f7a31fffb0e6c44fc12a56fc8f942e96328ac1e726b333a839f3a

  • SHA512

    a3982810cafa2d1d88903aaef583a2f69b473bc22251cdb682b83ea7fd6d753f213d177aaac916d78f74d01b122f481a61c2c7cbcfc01abc8b7c6892c7bd0e58

  • SSDEEP

    6144:M/iUMZXwnThvjiYeFHDi+DZUdHDgKh7o97cq7o:E6AnhXeFHDHCD7opcq7o

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Combo Editor Sexitor by Calina\Sexitor.exe
    "C:\Users\Admin\AppData\Local\Temp\Combo Editor Sexitor by Calina\Sexitor.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\ProgramData\wscsvc\wscsvc.exe
      C:\ProgramData\\wscsvc\\wscsvc.exe ,.
      2⤵
      • Executes dropped EXE
      PID:2780
    • C:\Users\Admin\AppData\Local\Temp\Combo Editor Sexitor by Calina\strip.dll
      strip.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 1628
        3⤵
        • Program crash
        PID:1696
    • C:\ProgramData\wupdater\wupdater.exe
      C:\ProgramData\\wupdater\\wupdater.exe WsBoDO0e98ai495yZoXP6E59ZgmRWU1OZgeu3FXqf6iKsmfa6uFCuZXvMfMidmgk
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\wscsvc\wscsvc.exe

    Filesize

    275KB

    MD5

    b9352fa2d673bf124116ba9e5639956e

    SHA1

    f511f3b653fc0a7a3e49d1cc58c21c9a53fcf79b

    SHA256

    58a0b8c13f085a3181fecc5d97cdfe5e35892af6b4b31d79657fc88512bb520d

    SHA512

    eea7bd7ff2023e2239b6d5a5ba96d4ecdab4217ecdd6f7403947aa09b1dd54db533bde3b8ef2256cdb720086754c716842bf98810c135b4d72f281dfe5dd48df

  • \ProgramData\wupdater\wupdater.exe

    Filesize

    1.8MB

    MD5

    26f56121184843056f1d6e6db3f9844b

    SHA1

    f8d6c767cab3be5e55608cc5abd30a4c383759e9

    SHA256

    3ad26e1c16b6f49c6136c0c1c02c5943437349a310a6bcc5a8a0f4924a6f4ae4

    SHA512

    13a0898a6780f474ab4ffe8e46ca0227f03f2c4d26daaf4b61862eb7374a65d887b96a8672f21247e7f3aac4c49cce77521dd1564983b52f8716219aff894b9d

  • memory/2764-18-0x000000007464E000-0x000000007464F000-memory.dmp

    Filesize

    4KB

  • memory/2764-19-0x0000000000190000-0x00000000001C2000-memory.dmp

    Filesize

    200KB

  • memory/2764-20-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2764-21-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2764-22-0x00000000004A0000-0x00000000004BC000-memory.dmp

    Filesize

    112KB

  • memory/2764-23-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB