Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2023 19:04

General

  • Target

    ecb41ffa4f12fbe99b2a53141ec9f240.exe

  • Size

    3.9MB

  • MD5

    ecb41ffa4f12fbe99b2a53141ec9f240

  • SHA1

    68c7c9a49c519319aba55bf686f2388ee782208d

  • SHA256

    740f7721beb9b54af9948a8b6876547e298891984275c68ad0d2ef421feb0ef2

  • SHA512

    1b4f1b2225663e986be31d3aabe1491d443eb192e9b34e0aec6c7146a01bd0d350b3f417fa68a41ee3645a367175de59ebf66165cd718e4f1529f7fa3c6b6e89

  • SSDEEP

    98304:x8vnvI2bIjGMWwAQ1cdLr3AG3cLMgs7T9/7AwCYyLb+P:Ung2QGMIxLEGMLMlx/7Zcv+P

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecb41ffa4f12fbe99b2a53141ec9f240.exe
    "C:\Users\Admin\AppData\Local\Temp\ecb41ffa4f12fbe99b2a53141ec9f240.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:276
        • C:\Windows\system32\choice.exe
          choice /C Y /N /D Y /T 0
          4⤵
            PID:332
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1464

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe

      Filesize

      429.2MB

      MD5

      360cf1b802c90daa515330c1a9e89518

      SHA1

      183a21881ce1618f77862dff05240d19d604bbdc

      SHA256

      8db8e5c52bc6d502f1566f12525d3ec4d1f4ee60a52e8a9b6f4fdf35358d67e5

      SHA512

      bcbcdd1d965d1dffc548c1c22011c154919b1fefd3d1a5b2379cd95807fa8de5c575b27512adc8fd97e8d8ce8587f3637eb3f4cd79a9063922c29de742c74d9c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aheaddecov.exe

      Filesize

      429.2MB

      MD5

      360cf1b802c90daa515330c1a9e89518

      SHA1

      183a21881ce1618f77862dff05240d19d604bbdc

      SHA256

      8db8e5c52bc6d502f1566f12525d3ec4d1f4ee60a52e8a9b6f4fdf35358d67e5

      SHA512

      bcbcdd1d965d1dffc548c1c22011c154919b1fefd3d1a5b2379cd95807fa8de5c575b27512adc8fd97e8d8ce8587f3637eb3f4cd79a9063922c29de742c74d9c

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe

      Filesize

      3.4MB

      MD5

      9db7f8ba57214489f97c8c785b4c727c

      SHA1

      968df2ab397063fcf6eb7720fa5ca24744230bc7

      SHA256

      c9487cb734eaca9afb87d6f71614bdfca5f3f5e70568971391d53e369badf149

      SHA512

      0fd530aeb633465bdffd134e4614ce9b3bbedd66537ce5edaeed93c2be00973029bd5f95c1a2733b192a2e9d18241af1cf9b5903a627af6012c8da22a40516c9

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe

      Filesize

      3.4MB

      MD5

      9db7f8ba57214489f97c8c785b4c727c

      SHA1

      968df2ab397063fcf6eb7720fa5ca24744230bc7

      SHA256

      c9487cb734eaca9afb87d6f71614bdfca5f3f5e70568971391d53e369badf149

      SHA512

      0fd530aeb633465bdffd134e4614ce9b3bbedd66537ce5edaeed93c2be00973029bd5f95c1a2733b192a2e9d18241af1cf9b5903a627af6012c8da22a40516c9

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe

      Filesize

      695KB

      MD5

      3c2aa77bd20b3ffb687f11e7c5bbea79

      SHA1

      6a9570c0c4b5e0fd6c5dd851f65cebc703bc580d

      SHA256

      7b477658201bcd770c3a07b1854c8d7fbb2c5535bb238954bda931f599455c31

      SHA512

      afc5ed38a82fee7fc72d4b6c1b87fac348d9409b7ca94b9cc0ad197b7fd55ed491a912377352fd5e0416344116d316cc123f7a043c52c7d6d98bd3917c1b6422

    • \Users\Admin\AppData\Local\Temp\RarSFX0\bebra.exe

      Filesize

      3.4MB

      MD5

      9db7f8ba57214489f97c8c785b4c727c

      SHA1

      968df2ab397063fcf6eb7720fa5ca24744230bc7

      SHA256

      c9487cb734eaca9afb87d6f71614bdfca5f3f5e70568971391d53e369badf149

      SHA512

      0fd530aeb633465bdffd134e4614ce9b3bbedd66537ce5edaeed93c2be00973029bd5f95c1a2733b192a2e9d18241af1cf9b5903a627af6012c8da22a40516c9

    • \Users\Admin\AppData\Local\Temp\RarSFX0\sisterservice.exe

      Filesize

      695KB

      MD5

      3c2aa77bd20b3ffb687f11e7c5bbea79

      SHA1

      6a9570c0c4b5e0fd6c5dd851f65cebc703bc580d

      SHA256

      7b477658201bcd770c3a07b1854c8d7fbb2c5535bb238954bda931f599455c31

      SHA512

      afc5ed38a82fee7fc72d4b6c1b87fac348d9409b7ca94b9cc0ad197b7fd55ed491a912377352fd5e0416344116d316cc123f7a043c52c7d6d98bd3917c1b6422

    • memory/864-54-0x0000000076831000-0x0000000076833000-memory.dmp

      Filesize

      8KB

    • memory/1464-89-0x0000000000FC0000-0x0000000000FC8000-memory.dmp

      Filesize

      32KB

    • memory/1976-67-0x000007FEFF790000-0x000007FEFF82F000-memory.dmp

      Filesize

      636KB

    • memory/1976-71-0x000007FEFCD60000-0x000007FEFCD7E000-memory.dmp

      Filesize

      120KB

    • memory/1976-75-0x000007FEFF4C0000-0x000007FEFF59B000-memory.dmp

      Filesize

      876KB

    • memory/1976-76-0x000007FEFCEE0000-0x000007FEFCF2C000-memory.dmp

      Filesize

      304KB

    • memory/1976-77-0x000007FEFD2A0000-0x000007FEFD2B7000-memory.dmp

      Filesize

      92KB

    • memory/1976-73-0x000007FEFD3F0000-0x000007FEFD412000-memory.dmp

      Filesize

      136KB

    • memory/1976-79-0x00000000003E0000-0x000000000043C000-memory.dmp

      Filesize

      368KB

    • memory/1976-80-0x00000000009E0000-0x00000000011E3000-memory.dmp

      Filesize

      8.0MB

    • memory/1976-72-0x000007FEFFC00000-0x000007FEFFC1F000-memory.dmp

      Filesize

      124KB

    • memory/1976-74-0x000007FEFD420000-0x000007FEFD46E000-memory.dmp

      Filesize

      312KB

    • memory/1976-70-0x000007FEFD900000-0x000007FEFD90F000-memory.dmp

      Filesize

      60KB

    • memory/1976-69-0x000007FEFF830000-0x000007FEFF95D000-memory.dmp

      Filesize

      1.2MB

    • memory/1976-68-0x000007FEFDAC0000-0x000007FEFDC27000-memory.dmp

      Filesize

      1.4MB

    • memory/1976-66-0x0000000077B40000-0x0000000077C5F000-memory.dmp

      Filesize

      1.1MB

    • memory/1976-65-0x000007FEFDD70000-0x000007FEFDDDC000-memory.dmp

      Filesize

      432KB

    • memory/1976-88-0x00000000009E0000-0x00000000011E3000-memory.dmp

      Filesize

      8.0MB