Analysis

  • max time kernel
    47s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2023 12:05

General

  • Target

    b2.exe

  • Size

    4.6MB

  • MD5

    2afcac7aaede32980c96fda99c8c8677

  • SHA1

    436e83ce6882e798e5bb6d89a31913285886d3a2

  • SHA256

    1cd60650fa3e560d8f7c80d4d059e669e64486bd3ca6daed52d8fdce14d0455b

  • SHA512

    5ccba16f2b31f1271487729c6d502529fa329d56dc126f080481d567c37c7ed68760c808e7fb6559293c65cf9ea8deca67ba2670a42a806d7e158ce79a513907

  • SSDEEP

    98304:DbcuGWyADhhIab1bvece79p6T215vhx8ovhqg4zi4RWouv60FFS7W:0dyhhIaZNeZy2Lb8Uf4G4EoE6t

Score
7/10

Malware Config

Signatures

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2.exe
    "C:\Users\Admin\AppData\Local\Temp\b2.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\system32\cmd.exe
      cmd /c
      2⤵
        PID:844
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get uuid
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
      • C:\Windows\System32\Wbem\wmic.exe
        wmic desktopmonitor get "screenheight, screenwidth"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
      • C:\Windows\system32\cmd.exe
        cmd /C net session
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:880
        • C:\Windows\system32\net.exe
          net session
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 session
            4⤵
              PID:1852
        • C:\Windows\system32\systeminfo.exe
          systeminfo
          2⤵
          • Gathers system information
          PID:1060
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM Telegram.exe
          2⤵
          • Kills process with taskkill
          PID:944

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Cab53ED.tmp

        Filesize

        62KB

        MD5

        3ac860860707baaf32469fa7cc7c0192

        SHA1

        c33c2acdaba0e6fa41fd2f00f186804722477639

        SHA256

        d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

        SHA512

        d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

      • C:\Users\Admin\AppData\Local\Temp\Tar54AB.tmp

        Filesize

        164KB

        MD5

        4ff65ad929cd9a367680e0e5b1c08166

        SHA1

        c0af0d4396bd1f15c45f39d3b849ba444233b3a2

        SHA256

        c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

        SHA512

        f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

      • memory/1264-54-0x000000013F260000-0x00000001400B4000-memory.dmp

        Filesize

        14.3MB

      • memory/1264-100-0x000000013F260000-0x00000001400B4000-memory.dmp

        Filesize

        14.3MB

      • memory/1264-138-0x000000013F260000-0x00000001400B4000-memory.dmp

        Filesize

        14.3MB

      • memory/1264-148-0x000000013F260000-0x00000001400B4000-memory.dmp

        Filesize

        14.3MB

      • memory/1264-186-0x000000013F260000-0x00000001400B4000-memory.dmp

        Filesize

        14.3MB

      • memory/1264-189-0x000000013F260000-0x00000001400B4000-memory.dmp

        Filesize

        14.3MB