Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
ILoveKids.exe
Resource
win10v2004-20250314-en
General
-
Target
ILoveKids.exe
-
Size
90KB
-
MD5
b6c4c49375cb3b54a63066deec0f23b5
-
SHA1
4f8b5cbaf0e20875eccab2a6dc08b10bd4880fcf
-
SHA256
76a4e97d29f23282682d4bf714d8a1a93ce954b3eda38d749a83552e990ecb4f
-
SHA512
63c612a920e4350c1b91329c741022a3835d18d30ecf189f0ac9535f37efb28a34a86ed3a76d3a2575562b7525c7fd33df52d6e0dcb61045a95a65d4aa99601a
-
SSDEEP
1536:P7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIf2wNiixOQ:j7DhdC6kzWypvaQ0FxyNTBf2C
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3632 attrib.exe 4740 attrib.exe -
Modifies file permissions 1 TTPs 12 IoCs
pid Process 4084 icacls.exe 4612 icacls.exe 3208 icacls.exe 2772 icacls.exe 1812 icacls.exe 4460 icacls.exe 4916 icacls.exe 4620 icacls.exe 4576 icacls.exe 4668 icacls.exe 4640 icacls.exe 5564 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Update = "C:\\Windows\\System32\\flare.bat" reg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat cmd.exe File opened for modification C:\Windows\System32\flare.bat attrib.exe File created C:\Windows\System32\flare_helper.bat cmd.exe File opened for modification C:\Windows\System32\flare_helper.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ILoveKids.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 3016 notepad.exe 4756 notepad.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3144 taskmgr.exe Token: SeSystemProfilePrivilege 3144 taskmgr.exe Token: SeCreateGlobalPrivilege 3144 taskmgr.exe Token: 33 3144 taskmgr.exe Token: SeIncBasePriorityPrivilege 3144 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe 3144 taskmgr.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1344 wrote to memory of 5816 1344 ILoveKids.exe 88 PID 1344 wrote to memory of 5816 1344 ILoveKids.exe 88 PID 5816 wrote to memory of 3632 5816 cmd.exe 89 PID 5816 wrote to memory of 3632 5816 cmd.exe 89 PID 5816 wrote to memory of 4640 5816 cmd.exe 90 PID 5816 wrote to memory of 4640 5816 cmd.exe 90 PID 5816 wrote to memory of 3208 5816 cmd.exe 91 PID 5816 wrote to memory of 3208 5816 cmd.exe 91 PID 5816 wrote to memory of 5564 5816 cmd.exe 92 PID 5816 wrote to memory of 5564 5816 cmd.exe 92 PID 5816 wrote to memory of 5176 5816 cmd.exe 93 PID 5816 wrote to memory of 5176 5816 cmd.exe 93 PID 5816 wrote to memory of 3976 5816 cmd.exe 96 PID 5816 wrote to memory of 3976 5816 cmd.exe 96 PID 5816 wrote to memory of 3016 5816 cmd.exe 97 PID 5816 wrote to memory of 3016 5816 cmd.exe 97 PID 5816 wrote to memory of 2772 5816 cmd.exe 98 PID 5816 wrote to memory of 2772 5816 cmd.exe 98 PID 5816 wrote to memory of 1812 5816 cmd.exe 99 PID 5816 wrote to memory of 1812 5816 cmd.exe 99 PID 5816 wrote to memory of 4460 5816 cmd.exe 100 PID 5816 wrote to memory of 4460 5816 cmd.exe 100 PID 5816 wrote to memory of 4084 5816 cmd.exe 101 PID 5816 wrote to memory of 4084 5816 cmd.exe 101 PID 5816 wrote to memory of 4916 5816 cmd.exe 102 PID 5816 wrote to memory of 4916 5816 cmd.exe 102 PID 5816 wrote to memory of 4620 5816 cmd.exe 103 PID 5816 wrote to memory of 4620 5816 cmd.exe 103 PID 5816 wrote to memory of 4612 5816 cmd.exe 104 PID 5816 wrote to memory of 4612 5816 cmd.exe 104 PID 5816 wrote to memory of 4576 5816 cmd.exe 105 PID 5816 wrote to memory of 4576 5816 cmd.exe 105 PID 5816 wrote to memory of 4668 5816 cmd.exe 106 PID 5816 wrote to memory of 4668 5816 cmd.exe 106 PID 5816 wrote to memory of 4740 5816 cmd.exe 107 PID 5816 wrote to memory of 4740 5816 cmd.exe 107 PID 5816 wrote to memory of 4756 5816 cmd.exe 108 PID 5816 wrote to memory of 4756 5816 cmd.exe 108 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3632 attrib.exe 4740 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ILoveKids.exe"C:\Users\Admin\AppData\Local\Temp\ILoveKids.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8DB9.tmp\8DBA.tmp\8DBB.bat C:\Users\Admin\AppData\Local\Temp\ILoveKids.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5816 -
C:\Windows\system32\attrib.exeattrib +s +h +r "C:\Windows\System32\flare.bat"3⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:3632
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Everyone:(F)3⤵
- Modifies file permissions
PID:4640
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny SYSTEM:(F)3⤵
- Modifies file permissions
PID:3208
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\flare.bat" /deny Administrators:(F)3⤵
- Modifies file permissions
PID:5564
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Security Update" /t REG_SZ /d "C:\Windows\System32\flare.bat" /f3⤵
- Adds Run key to start application
PID:5176
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:3976
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\flare_warning.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:3016
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\CON" /deny Everyone:(F3⤵
- Modifies file permissions
PID:2772
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\PRN" /deny Everyone:(F3⤵
- Modifies file permissions
PID:1812
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AUX" /deny Everyone:(F3⤵
- Modifies file permissions
PID:4460
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\NUL" /deny Everyone:(F3⤵
- Modifies file permissions
PID:4084
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM1" /deny Everyone:(F3⤵
- Modifies file permissions
PID:4916
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM2" /deny Everyone:(F3⤵
- Modifies file permissions
PID:4620
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\COM3" /deny Everyone:(F3⤵
- Modifies file permissions
PID:4612
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT1" /deny Everyone:(F3⤵
- Modifies file permissions
PID:4576
-
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\LPT2" /deny Everyone:(F3⤵
- Modifies file permissions
PID:4668
-
-
C:\Windows\system32\attrib.exeattrib +s +h "C:\Users\Admin\Desktop\LPT2"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4740
-
-
C:\Windows\system32\notepad.exenotepad "C:\Users\Admin\Desktop\LPT2\lockfile.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:4756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\flare.bat1⤵PID:5268
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3144
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5946bf3b4f25650e511646d57cba89de6
SHA190dfe5ff9e2a5c23497a73ba8b79b3a298371b7e
SHA2569e1533c484246349900386603717ebc57e568a6f366f7129497f4f8d80857741
SHA512eeee3877f4011b90e1c06725bfed06a327df79ead15b57d34dbcf8f4405687f7915b1e088b9d90bd9eff4a2b99d9be887e2d94fce1a8d4e9a3398e0d2b093fdd
-
Filesize
16B
MD535519859078faf1bb9ff9aa6d97e02f7
SHA1f62fa3cba186ac4fc65321e5b24f3b3c6713e168
SHA256c76a191235beca08d9290c53f8832be67b1b9671269674ece289e3162157d2b1
SHA512674ed9c45e4070cd2de21e7a74fe8327ad3db7234a306988fd579e126f6c37ce5a39fa45cbf2da818c81bf7dfcf160f4f993f9fb3d3a85a1530101564ced9df9
-
Filesize
90KB
MD5b6c4c49375cb3b54a63066deec0f23b5
SHA14f8b5cbaf0e20875eccab2a6dc08b10bd4880fcf
SHA25676a4e97d29f23282682d4bf714d8a1a93ce954b3eda38d749a83552e990ecb4f
SHA51263c612a920e4350c1b91329c741022a3835d18d30ecf189f0ac9535f37efb28a34a86ed3a76d3a2575562b7525c7fd33df52d6e0dcb61045a95a65d4aa99601a