Overview
overview
7Static
static
7AIO Giftca...re.exe
windows7-x64
7AIO Giftca...re.exe
windows10-2004-x64
7AIO Giftca...ox.exe
windows7-x64
3AIO Giftca...ox.exe
windows10-2004-x64
3AIO Giftca...32.exe
windows7-x64
1AIO Giftca...32.exe
windows10-2004-x64
3AIO Giftca...re.exe
windows7-x64
1AIO Giftca...re.exe
windows10-2004-x64
1Combo Edit...FS.exe
windows7-x64
1Combo Edit...FS.exe
windows10-2004-x64
3Combo Edit...le.dll
windows7-x64
1Combo Edit...le.dll
windows10-2004-x64
1Combo Edit...on.dll
windows7-x64
1Combo Edit...on.dll
windows10-2004-x64
1Combo Edit...or.exe
windows7-x64
7Combo Edit...or.exe
windows10-2004-x64
7Combo Edit...al.dll
windows7-x64
1Combo Edit...al.dll
windows10-2004-x64
1Combo Edit...ds.dll
windows7-x64
1Combo Edit...ds.dll
windows10-2004-x64
1Combo Edit...47.exe
windows7-x64
3Combo Edit...47.exe
windows10-2004-x64
3Combo Edit...ip.exe
windows7-x64
3Combo Edit...ip.exe
windows10-2004-x64
7Fortnite C...BW.exe
windows7-x64
7Fortnite C...BW.exe
windows10-2004-x64
7Fortnite C...32.exe
windows7-x64
1Fortnite C...32.exe
windows10-2004-x64
3Fortnite C...32.exe
windows7-x64
3Fortnite C...32.exe
windows10-2004-x64
3Fortnite C...ef.exe
windows7-x64
3Fortnite C...ef.exe
windows10-2004-x64
3Analysis
-
max time kernel
107s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 12:17
Behavioral task
behavioral1
Sample
AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
AIO Giftcard Generator by Acquire\Qt5CoreVBox.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
AIO Giftcard Generator by Acquire\Qt5CoreVBox.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
AIO Giftcard Generator by Acquire\bin32.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
AIO Giftcard Generator by Acquire\bin32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
AIO Giftcard Generator by Acquire\core.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
AIO Giftcard Generator by Acquire\core.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Combo Editor Sexitor by Calina\AlphaFS.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Combo Editor Sexitor by Calina\AlphaFS.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Combo Editor Sexitor by Calina\Colorful.Console.dll
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
Combo Editor Sexitor by Calina\Colorful.Console.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Combo Editor Sexitor by Calina\Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Combo Editor Sexitor by Calina\Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
Combo Editor Sexitor by Calina\Sexitor.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Combo Editor Sexitor by Calina\Sexitor.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Combo Editor Sexitor by Calina\TrinitySeal.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Combo Editor Sexitor by Calina\TrinitySeal.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
Combo Editor Sexitor by Calina\WThreads.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Combo Editor Sexitor by Calina\WThreads.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Combo Editor Sexitor by Calina\d3dcompiler_47.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Combo Editor Sexitor by Calina\d3dcompiler_47.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Combo Editor Sexitor by Calina\strip.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
Combo Editor Sexitor by Calina\strip.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
Fortnite Checker by Burnwood\Fortnite Checker BW.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Fortnite Checker by Burnwood\Fortnite Checker BW.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
Fortnite Checker by Burnwood\bin32.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Fortnite Checker by Burnwood\bin32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Fortnite Checker by Burnwood\database32.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Fortnite Checker by Burnwood\database32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
Fortnite Checker by Burnwood\libcef.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Fortnite Checker by Burnwood\libcef.exe
Resource
win10v2004-20250314-en
General
-
Target
AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe
-
Size
284KB
-
MD5
04142f894c394b262245746d3a9fd3ad
-
SHA1
368803226a985ff2faf6b02c38fa7f706df49ad1
-
SHA256
8dd6477fa8e19f220f167310d2961b7c2a223ed46dd883164913fcac480e8350
-
SHA512
4324a8796baf5a701ff49c1d1361433c49042bc4a67b2708c8f4f16e6c8aa9cc62c6d0b6bd7ca66bbf855b629fb805035f05f78deae48d2baae91f7667a8c711
-
SSDEEP
6144:5/fUcZlwn55vjiieFHDi+DZUdHDgKhnoUlYN30AUcq7o:CK2n/NeFHDHCDno0YN30AUcq7o
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5220 wscsvc.exe 4700 wupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIOgenerator by Acquire.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wupdater.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4588 wrote to memory of 5220 4588 AIOgenerator by Acquire.exe 89 PID 4588 wrote to memory of 5220 4588 AIOgenerator by Acquire.exe 89 PID 4588 wrote to memory of 5220 4588 AIOgenerator by Acquire.exe 89 PID 4588 wrote to memory of 4548 4588 AIOgenerator by Acquire.exe 90 PID 4588 wrote to memory of 4548 4588 AIOgenerator by Acquire.exe 90 PID 4588 wrote to memory of 4700 4588 AIOgenerator by Acquire.exe 91 PID 4588 wrote to memory of 4700 4588 AIOgenerator by Acquire.exe 91 PID 4588 wrote to memory of 4700 4588 AIOgenerator by Acquire.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe"C:\Users\Admin\AppData\Local\Temp\AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\ProgramData\wscsvc\wscsvc.exeC:\ProgramData\\wscsvc\\wscsvc.exe ,.2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\AIO Giftcard Generator by Acquire\core.cfgcore.cfg2⤵PID:4548
-
-
C:\ProgramData\wupdater\wupdater.exeC:\ProgramData\\wupdater\\wupdater.exe sA0gp64K3Ef3JDqIhRP39sQZktNPEapm80qHol6ZoAHU4XiFSWQEMo75F817ZuaF2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5b9352fa2d673bf124116ba9e5639956e
SHA1f511f3b653fc0a7a3e49d1cc58c21c9a53fcf79b
SHA25658a0b8c13f085a3181fecc5d97cdfe5e35892af6b4b31d79657fc88512bb520d
SHA512eea7bd7ff2023e2239b6d5a5ba96d4ecdab4217ecdd6f7403947aa09b1dd54db533bde3b8ef2256cdb720086754c716842bf98810c135b4d72f281dfe5dd48df
-
Filesize
1.8MB
MD526f56121184843056f1d6e6db3f9844b
SHA1f8d6c767cab3be5e55608cc5abd30a4c383759e9
SHA2563ad26e1c16b6f49c6136c0c1c02c5943437349a310a6bcc5a8a0f4924a6f4ae4
SHA51213a0898a6780f474ab4ffe8e46ca0227f03f2c4d26daaf4b61862eb7374a65d887b96a8672f21247e7f3aac4c49cce77521dd1564983b52f8716219aff894b9d