Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 16:13

General

  • Target

    4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2.exe

  • Size

    520KB

  • MD5

    0c33f359163569ceb73dff9c36fc6240

  • SHA1

    c9a85bed124dedd4d41c45084e84aa28a6c8abd9

  • SHA256

    4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2

  • SHA512

    f86b3373daf31a7e94c1cc84c00923465fa4aea6f49e8a251433a4740882afc75dbc0c1991b59442ff822443805d92e63944c7c6f847eb3f914f23fc9fbc8bc5

  • SSDEEP

    12288:zXCNi9BF+6YaHe67wpdXYOVLtAcfs4SgDF:2WF+6YQspdXd8cfNSM

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2.exe
    "C:\Users\Admin\AppData\Local\Temp\4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2.exe
      "C:\Users\Admin\AppData\Local\Temp\4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2.exe
        "C:\Users\Admin\AppData\Local\Temp\4f9014416a3eab0d29a8f15c3ae8483ed80a5d8716d5d7dbd10770fa7d7965b2.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB