Analysis
-
max time kernel
128s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:13
Behavioral task
behavioral1
Sample
6666bd2d13471383d519373f4c8f9704.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6666bd2d13471383d519373f4c8f9704.exe
Resource
win10v2004-20231215-en
General
-
Target
6666bd2d13471383d519373f4c8f9704.exe
-
Size
854KB
-
MD5
6666bd2d13471383d519373f4c8f9704
-
SHA1
c284404141fc9e6f4f907cc1b03f674312227418
-
SHA256
bbef6fa7c85592e91e6d07b34a82f4c2bb2260061fe82f0cf8ba6aed13e5c83f
-
SHA512
6ac8e5542df26b4b25aaa6d0a2cf19cad3c7e85ecfa72dbdc97f13d2916e26e5ceb16e2ad61f25eeb962f6b050a0edc2163d23b215b4e9f674a678ce17ae34a6
-
SSDEEP
12288:sr/tRZf7cw58UcDNwByTCO9TGpchCs5roAUfu6/lxCDxlB9v0G4uaPVHY+hvaRx/:+jbwD2y5IxsCfZHCDxFcxpPV4+Ng
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2652-0-0x0000000000400000-0x0000000000A23000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Malware Protection = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6666bd2d13471383d519373f4c8f9704.exe" 6666bd2d13471383d519373f4c8f9704.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\H: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\I: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\J: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\Q: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\Y: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\G: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\N: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\P: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\T: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\R: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\S: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\V: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\K: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\L: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\M: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\O: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\E: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\W: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\X: 6666bd2d13471383d519373f4c8f9704.exe File opened (read-only) \??\Z: 6666bd2d13471383d519373f4c8f9704.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6666bd2d13471383d519373f4c8f9704.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 6666bd2d13471383d519373f4c8f9704.exe 2652 6666bd2d13471383d519373f4c8f9704.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6666bd2d13471383d519373f4c8f9704.exe"C:\Users\Admin\AppData\Local\Temp\6666bd2d13471383d519373f4c8f9704.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1