Analysis

  • max time kernel
    72s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:17

General

  • Target

    b5f94e2e83eb4dbf4022650338fb9b66d9daff9ccef2c6e1f0599a9e605280f7.exe

  • Size

    1.3MB

  • MD5

    b3bd36c13ec6c9cf0436064a5bead336

  • SHA1

    2b7579230c629d44f6b1bd854b958954ddfa207f

  • SHA256

    b5f94e2e83eb4dbf4022650338fb9b66d9daff9ccef2c6e1f0599a9e605280f7

  • SHA512

    b4756964af56a46c739d7f0f558001d9faa275f0a4b96aaad9eae684b39e6933835cd08a8b0700b2fe21dbbc60ea7f4c0fd11daa850ffdf2761131dd4ec1dfd7

  • SSDEEP

    24576:+s5jVdqt7MREUwiMzyPLKUe/YCix/Brm3ig93BtWDp8x:+s5jrA7MRg7wLK7gF/8SgBBtWD

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5f94e2e83eb4dbf4022650338fb9b66d9daff9ccef2c6e1f0599a9e605280f7.exe
    "C:\Users\Admin\AppData\Local\Temp\b5f94e2e83eb4dbf4022650338fb9b66d9daff9ccef2c6e1f0599a9e605280f7.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\Sex mashine.exe
      "C:\Users\Admin\AppData\Local\Temp\Sex mashine.exe"
      2⤵
      • Executes dropped EXE
      PID:1108
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x564
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Sex mashine.exe

    Filesize

    1.1MB

    MD5

    386263d0f48b65645fb32cd461985b96

    SHA1

    53059d9805fb36777d383a2c5c0f2875aa682b35

    SHA256

    691b44afde634b48c5a532af7e8ef5861d4424a9d962d740d78a58ad546f919c

    SHA512

    35e2c24e0c28e0969fb5f001047fba8bc989235ba7c39a9d263779b6516d2851ce382caf560de0a3db108b91f8f945b1cda23b152b2b970f7e3ed8e171a5a5a7

  • C:\Users\Admin\AppData\Local\Temp\Sex mashine.exe

    Filesize

    1.1MB

    MD5

    386263d0f48b65645fb32cd461985b96

    SHA1

    53059d9805fb36777d383a2c5c0f2875aa682b35

    SHA256

    691b44afde634b48c5a532af7e8ef5861d4424a9d962d740d78a58ad546f919c

    SHA512

    35e2c24e0c28e0969fb5f001047fba8bc989235ba7c39a9d263779b6516d2851ce382caf560de0a3db108b91f8f945b1cda23b152b2b970f7e3ed8e171a5a5a7

  • \Users\Admin\AppData\Local\Temp\Sex mashine.exe

    Filesize

    1.1MB

    MD5

    386263d0f48b65645fb32cd461985b96

    SHA1

    53059d9805fb36777d383a2c5c0f2875aa682b35

    SHA256

    691b44afde634b48c5a532af7e8ef5861d4424a9d962d740d78a58ad546f919c

    SHA512

    35e2c24e0c28e0969fb5f001047fba8bc989235ba7c39a9d263779b6516d2851ce382caf560de0a3db108b91f8f945b1cda23b152b2b970f7e3ed8e171a5a5a7

  • \Users\Admin\AppData\Local\Temp\Sex mashine.exe

    Filesize

    1.1MB

    MD5

    386263d0f48b65645fb32cd461985b96

    SHA1

    53059d9805fb36777d383a2c5c0f2875aa682b35

    SHA256

    691b44afde634b48c5a532af7e8ef5861d4424a9d962d740d78a58ad546f919c

    SHA512

    35e2c24e0c28e0969fb5f001047fba8bc989235ba7c39a9d263779b6516d2851ce382caf560de0a3db108b91f8f945b1cda23b152b2b970f7e3ed8e171a5a5a7

  • memory/1108-59-0x0000000000000000-mapping.dmp

  • memory/1672-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

    Filesize

    8KB

  • memory/1672-55-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1672-56-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1672-61-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB