Analysis

  • max time kernel
    143s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2023, 20:54

General

  • Target

    fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe

  • Size

    1.9MB

  • MD5

    fd37e10f14a82990e48fffa1cf2922a2

  • SHA1

    e7a5576b9aa33a05e288f15cbd74945052fbb994

  • SHA256

    fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52

  • SHA512

    8181c71826dc86c8dc32d8f940bf3a29a4819ef836161f146c35d6e049407397dee838a00cd1726dd15cb32ce6857ad3ff636c825cdcd426d70d447c98bc653f

  • SSDEEP

    49152:uwT36Xi/99PlRz8rQ6SugaARI31E+seIeQ2/d2+rS2:ua36SFBlRorQBR41Rs0Q2/gK5

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe
    "C:\Users\Admin\AppData\Local\Temp\fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\oem.exe
      "C:\Users\Admin\AppData\Local\Temp\oem.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      PID:2724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_hao.360.com_0.localstorage

    Filesize

    320KB

    MD5

    819aac86f97be26aabfbd85f719b3b83

    SHA1

    c7eb2de655d8ddbba0229d8673f40a18d1a0ea64

    SHA256

    e3694f6547b3d3bf49feaa0ae54485ad54092516c275ab2e669554e0c6952ab3

    SHA512

    8fcee3d81c6e40be7c8e0d4884e00a4bfa1c8e683a69e596d7080dc29938f0bc952df72f2ffcda0a12791a202e012052dc36a1f7d6d6653785cbaf8f7108cce9

  • C:\Users\Admin\AppData\Local\Temp\oem.exe

    Filesize

    881KB

    MD5

    75f2202053644685b0306f6dfb2fc1fa

    SHA1

    0a48f7a97fef177284a020bf647b201f91e5fbd0

    SHA256

    01224939ac638e6021b1d26a780f6696dc3d7d23954d0327077a7c398e89c4d7

    SHA512

    b6c597be87c20b74966334960687690075e26ba0c0f2a876ebdee3a093583c745d65ca5269475eaf0277953f5e6b89651094a2f27c31e946b1154a27bd2d1c30

  • C:\Users\Admin\AppData\Local\Temp\oem.exe

    Filesize

    881KB

    MD5

    75f2202053644685b0306f6dfb2fc1fa

    SHA1

    0a48f7a97fef177284a020bf647b201f91e5fbd0

    SHA256

    01224939ac638e6021b1d26a780f6696dc3d7d23954d0327077a7c398e89c4d7

    SHA512

    b6c597be87c20b74966334960687690075e26ba0c0f2a876ebdee3a093583c745d65ca5269475eaf0277953f5e6b89651094a2f27c31e946b1154a27bd2d1c30

  • C:\Users\Admin\AppData\Local\Temp\oem.exe

    Filesize

    881KB

    MD5

    75f2202053644685b0306f6dfb2fc1fa

    SHA1

    0a48f7a97fef177284a020bf647b201f91e5fbd0

    SHA256

    01224939ac638e6021b1d26a780f6696dc3d7d23954d0327077a7c398e89c4d7

    SHA512

    b6c597be87c20b74966334960687690075e26ba0c0f2a876ebdee3a093583c745d65ca5269475eaf0277953f5e6b89651094a2f27c31e946b1154a27bd2d1c30

  • C:\Users\Admin\AppData\Roaming\secoresdk\360se6\User Data\Default\Bookmarks

    Filesize

    5KB

    MD5

    ed1ba832500799ec049639a81e33818c

    SHA1

    9eaa887e9ce8ffd7d517982d3d5c97cb148a7063

    SHA256

    16b9946bcbdf32904fb2c2b17b8497170ef109f2604ab227576fdab0b27f9ddb

    SHA512

    f6397f4b0c93dc0f8dd3fcb1325da9ad90edc41b3a6de8a3ca7efb5385c708b97372ba501aabc38b3dcff6984a87130d649db3150c6b74cb4b49b4d42e833030

  • memory/1924-359-0x0000000000400000-0x0000000000E37000-memory.dmp

    Filesize

    10.2MB

  • memory/2724-357-0x0000000000400000-0x0000000000680000-memory.dmp

    Filesize

    2.5MB

  • memory/2724-358-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/2724-360-0x0000000000400000-0x0000000000680000-memory.dmp

    Filesize

    2.5MB