Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    13-03-2022 11:32

General

  • Target

    ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe

  • Size

    6.0MB

  • MD5

    d24fbb35cf9c6f4f53bfee6043f07a6e

  • SHA1

    01a84ddbe70dbaa93bc840637ac3c1799fa0e24d

  • SHA256

    ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8

  • SHA512

    2ad5422014450939805f04189f4f72850728e82eff16ae612f03b1c8e34f14f4bb1bac9fabde63f9be3e407d37a3b664cfb61272d400c4eb4e213c1579e62715

Malware Config

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 2 IoCs
  • Executes dropped EXE 8 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe
    "C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Program Files (x86)\Company\NewProduct\setup.exe
      "C:\Program Files (x86)\Company\NewProduct\setup.exe"
      2⤵
      • Executes dropped EXE
      PID:4672
    • C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe
      "C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exe
        C:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:4488
    • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
      "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2468
    • C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe
      "C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\system32\fondue.exe
        "C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
        3⤵
          PID:4828
      • C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe
        "C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4216
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          PID:2388
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:216

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2468-169-0x0000000004250000-0x0000000004258000-memory.dmp

      Filesize

      32KB

    • memory/2468-161-0x00000000036E0000-0x00000000036F0000-memory.dmp

      Filesize

      64KB

    • memory/2468-167-0x0000000004190000-0x0000000004198000-memory.dmp

      Filesize

      32KB

    • memory/2468-168-0x00000000041B0000-0x00000000041B8000-memory.dmp

      Filesize

      32KB

    • memory/2468-155-0x0000000003540000-0x0000000003550000-memory.dmp

      Filesize

      64KB

    • memory/2468-170-0x0000000004390000-0x0000000004398000-memory.dmp

      Filesize

      32KB

    • memory/2468-171-0x00000000043B0000-0x00000000043B8000-memory.dmp

      Filesize

      32KB

    • memory/2468-172-0x00000000041B0000-0x00000000041B8000-memory.dmp

      Filesize

      32KB

    • memory/2468-173-0x00000000041B0000-0x00000000041B8000-memory.dmp

      Filesize

      32KB

    • memory/4488-250-0x00000000043D0000-0x00000000083D0000-memory.dmp

      Filesize

      64.0MB

    • memory/4488-251-0x0000000072E70000-0x0000000073620000-memory.dmp

      Filesize

      7.7MB

    • memory/4488-253-0x000000000AEF2000-0x000000000AEF3000-memory.dmp

      Filesize

      4KB

    • memory/4488-252-0x000000000AEF0000-0x000000000AEF1000-memory.dmp

      Filesize

      4KB

    • memory/4488-254-0x000000000AEF3000-0x000000000AEF4000-memory.dmp

      Filesize

      4KB

    • memory/4488-255-0x000000000B520000-0x000000000BB38000-memory.dmp

      Filesize

      6.1MB

    • memory/4488-256-0x000000000AF90000-0x000000000AFA2000-memory.dmp

      Filesize

      72KB

    • memory/4488-257-0x000000000AFF0000-0x000000000B02C000-memory.dmp

      Filesize

      240KB

    • memory/4488-258-0x000000000AEF4000-0x000000000AEF5000-memory.dmp

      Filesize

      4KB

    • memory/4488-259-0x000000000B2A0000-0x000000000B3AA000-memory.dmp

      Filesize

      1.0MB