Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2023, 19:04

General

  • Target

    ecb41ffa4f12fbe99b2a53141ec9f240.exe

  • Size

    3.9MB

  • MD5

    ecb41ffa4f12fbe99b2a53141ec9f240

  • SHA1

    68c7c9a49c519319aba55bf686f2388ee782208d

  • SHA256

    740f7721beb9b54af9948a8b6876547e298891984275c68ad0d2ef421feb0ef2

  • SHA512

    1b4f1b2225663e986be31d3aabe1491d443eb192e9b34e0aec6c7146a01bd0d350b3f417fa68a41ee3645a367175de59ebf66165cd718e4f1529f7fa3c6b6e89

  • SSDEEP

    98304:x8vnvI2bIjGMWwAQ1cdLr3AG3cLMgs7T9/7AwCYyLb+P:Ung2QGMIxLEGMLMlx/7Zcv+P

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecb41ffa4f12fbe99b2a53141ec9f240.exe
    "C:\Users\Admin\AppData\Local\Temp\ecb41ffa4f12fbe99b2a53141ec9f240.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:276
        • C:\Windows\system32\choice.exe
          choice /C Y /N /D Y /T 0
          4⤵
            PID:332
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1464

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe

            Filesize

            429.2MB

            MD5

            360cf1b802c90daa515330c1a9e89518

            SHA1

            183a21881ce1618f77862dff05240d19d604bbdc

            SHA256

            8db8e5c52bc6d502f1566f12525d3ec4d1f4ee60a52e8a9b6f4fdf35358d67e5

            SHA512

            bcbcdd1d965d1dffc548c1c22011c154919b1fefd3d1a5b2379cd95807fa8de5c575b27512adc8fd97e8d8ce8587f3637eb3f4cd79a9063922c29de742c74d9c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe

            Filesize

            429.2MB

            MD5

            360cf1b802c90daa515330c1a9e89518

            SHA1

            183a21881ce1618f77862dff05240d19d604bbdc

            SHA256

            8db8e5c52bc6d502f1566f12525d3ec4d1f4ee60a52e8a9b6f4fdf35358d67e5

            SHA512

            bcbcdd1d965d1dffc548c1c22011c154919b1fefd3d1a5b2379cd95807fa8de5c575b27512adc8fd97e8d8ce8587f3637eb3f4cd79a9063922c29de742c74d9c

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe

            Filesize

            3.4MB

            MD5

            9db7f8ba57214489f97c8c785b4c727c

            SHA1

            968df2ab397063fcf6eb7720fa5ca24744230bc7

            SHA256

            c9487cb734eaca9afb87d6f71614bdfca5f3f5e70568971391d53e369badf149

            SHA512

            0fd530aeb633465bdffd134e4614ce9b3bbedd66537ce5edaeed93c2be00973029bd5f95c1a2733b192a2e9d18241af1cf9b5903a627af6012c8da22a40516c9

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe

            Filesize

            3.4MB

            MD5

            9db7f8ba57214489f97c8c785b4c727c

            SHA1

            968df2ab397063fcf6eb7720fa5ca24744230bc7

            SHA256

            c9487cb734eaca9afb87d6f71614bdfca5f3f5e70568971391d53e369badf149

            SHA512

            0fd530aeb633465bdffd134e4614ce9b3bbedd66537ce5edaeed93c2be00973029bd5f95c1a2733b192a2e9d18241af1cf9b5903a627af6012c8da22a40516c9

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe

            Filesize

            695KB

            MD5

            3c2aa77bd20b3ffb687f11e7c5bbea79

            SHA1

            6a9570c0c4b5e0fd6c5dd851f65cebc703bc580d

            SHA256

            7b477658201bcd770c3a07b1854c8d7fbb2c5535bb238954bda931f599455c31

            SHA512

            afc5ed38a82fee7fc72d4b6c1b87fac348d9409b7ca94b9cc0ad197b7fd55ed491a912377352fd5e0416344116d316cc123f7a043c52c7d6d98bd3917c1b6422

          • \Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe

            Filesize

            3.4MB

            MD5

            9db7f8ba57214489f97c8c785b4c727c

            SHA1

            968df2ab397063fcf6eb7720fa5ca24744230bc7

            SHA256

            c9487cb734eaca9afb87d6f71614bdfca5f3f5e70568971391d53e369badf149

            SHA512

            0fd530aeb633465bdffd134e4614ce9b3bbedd66537ce5edaeed93c2be00973029bd5f95c1a2733b192a2e9d18241af1cf9b5903a627af6012c8da22a40516c9

          • \Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe

            Filesize

            695KB

            MD5

            3c2aa77bd20b3ffb687f11e7c5bbea79

            SHA1

            6a9570c0c4b5e0fd6c5dd851f65cebc703bc580d

            SHA256

            7b477658201bcd770c3a07b1854c8d7fbb2c5535bb238954bda931f599455c31

            SHA512

            afc5ed38a82fee7fc72d4b6c1b87fac348d9409b7ca94b9cc0ad197b7fd55ed491a912377352fd5e0416344116d316cc123f7a043c52c7d6d98bd3917c1b6422

          • memory/864-54-0x0000000076831000-0x0000000076833000-memory.dmp

            Filesize

            8KB

          • memory/1464-89-0x0000000000FC0000-0x0000000000FC8000-memory.dmp

            Filesize

            32KB

          • memory/1976-67-0x000007FEFF790000-0x000007FEFF82F000-memory.dmp

            Filesize

            636KB

          • memory/1976-71-0x000007FEFCD60000-0x000007FEFCD7E000-memory.dmp

            Filesize

            120KB

          • memory/1976-75-0x000007FEFF4C0000-0x000007FEFF59B000-memory.dmp

            Filesize

            876KB

          • memory/1976-76-0x000007FEFCEE0000-0x000007FEFCF2C000-memory.dmp

            Filesize

            304KB

          • memory/1976-77-0x000007FEFD2A0000-0x000007FEFD2B7000-memory.dmp

            Filesize

            92KB

          • memory/1976-73-0x000007FEFD3F0000-0x000007FEFD412000-memory.dmp

            Filesize

            136KB

          • memory/1976-79-0x00000000003E0000-0x000000000043C000-memory.dmp

            Filesize

            368KB

          • memory/1976-80-0x00000000009E0000-0x00000000011E3000-memory.dmp

            Filesize

            8.0MB

          • memory/1976-72-0x000007FEFFC00000-0x000007FEFFC1F000-memory.dmp

            Filesize

            124KB

          • memory/1976-74-0x000007FEFD420000-0x000007FEFD46E000-memory.dmp

            Filesize

            312KB

          • memory/1976-70-0x000007FEFD900000-0x000007FEFD90F000-memory.dmp

            Filesize

            60KB

          • memory/1976-69-0x000007FEFF830000-0x000007FEFF95D000-memory.dmp

            Filesize

            1.2MB

          • memory/1976-68-0x000007FEFDAC0000-0x000007FEFDC27000-memory.dmp

            Filesize

            1.4MB

          • memory/1976-66-0x0000000077B40000-0x0000000077C5F000-memory.dmp

            Filesize

            1.1MB

          • memory/1976-65-0x000007FEFDD70000-0x000007FEFDDDC000-memory.dmp

            Filesize

            432KB

          • memory/1976-88-0x00000000009E0000-0x00000000011E3000-memory.dmp

            Filesize

            8.0MB