Resubmissions

21-01-2024 14:52

240121-r8syqaeac7 10

21-01-2024 14:51

240121-r8k8waeac5 10

01-01-2024 13:55

240101-q776kscacp 10

Analysis

  • max time kernel
    123s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2024 14:51

General

  • Target

    e24b84c0201106d00cb293da0216414c8bc60de61d8de5f7ffdcd660e67317db.exe

  • Size

    11KB

  • MD5

    f4d8bb082b0d03efd6990cc2f4336165

  • SHA1

    48abb4773cdc2c70ea90aa4f38a8942f8bca60f3

  • SHA256

    e24b84c0201106d00cb293da0216414c8bc60de61d8de5f7ffdcd660e67317db

  • SHA512

    2fca524f0aa0f3bf9605f8a7007dfe14f1383f976ce519299fc0991a073d78961ecf1c1d84671016f8814dd55dcf78a7c8d1ebe86cd7f59c53f1874e8a0d65da

  • SSDEEP

    192:5QEguYoCj6K4KRUZJqBEjTedm53AebdKS5p:5GOKRUZ9aC7

Malware Config

Signatures

  • Renames multiple (1631) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e24b84c0201106d00cb293da0216414c8bc60de61d8de5f7ffdcd660e67317db.exe
    "C:\Users\Admin\AppData\Local\Temp\e24b84c0201106d00cb293da0216414c8bc60de61d8de5f7ffdcd660e67317db.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.doyuk2

    Filesize

    12KB

    MD5

    724fc8d3ce9e489ebbf91cd977e44ad1

    SHA1

    dfd1b501d6054009f3fa7f1868dd4b9ca11f02ce

    SHA256

    037c7cc72a7b145beb49107bd0791224561c602b18d431519a42e91682751d9e

    SHA512

    11cb1c27cf0d5f6fd413bb2d3ab38cddf6d9ce2b627dc85d42dc73c86a0d2ebee446689b87886b56bc9865fd009ea9969c78082724952ea6ef7632d41525787d

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.doyuk2

    Filesize

    8KB

    MD5

    27f92350c261df0f508464ea2e3c38e8

    SHA1

    d2505b1750bf78f57e3cd11224379a50e2b1c8a3

    SHA256

    580e307d4088f80e8c65148d07e9020052304dbd07b3ff2cb526075981a66d9c

    SHA512

    ef743aeebf5af271105a2251d8f6b830073c552c1f49ec8bcc36b97e95541affe4de01017ea31f28cd5cf0eae7c2429e0bb8e4eddc6b370852dca848627f9cf8

  • C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif.doyuk2

    Filesize

    160B

    MD5

    c5a8f0ac248005b6b0ad0be6e10c4dad

    SHA1

    1540b272f7843b6e82142f0dfcd48e1c175dc461

    SHA256

    4baea01770139cd6c9911d0cc803e510af0ca3ec2bfc07293986cd39663500f9

    SHA512

    6ed9c1f4a8b35e48c0d6571bf3b7aa7673adfb081a0d3e26fad2e6ca0f1d7533757c8ba9289a5c74315e3e63fec4dab93605d383ecf94c86eb12b7fd82f361a6

  • C:\Users\Admin\AppData\Local\Temp\Warning.txt

    Filesize

    236B

    MD5

    2fa758d9985663438d0a8e439e7796bd

    SHA1

    8bfab4389532ef2bdf68ceea0ca367eb09856b10

    SHA256

    d5aa6c774404750f82c11d4e420cb3187f06f28eb1ff3a7579f184bd7155a7d7

    SHA512

    4bca2b8c187053969fba168cc5cfb6649657f4ef551c1ed35956a4e682284cef82e103a5c10f4b188c742a28222a423cd3206a6318d38bc3716baff1c1cb5c4f

  • memory/1936-0-0x0000000000060000-0x000000000006A000-memory.dmp

    Filesize

    40KB

  • memory/1936-1-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

    Filesize

    9.9MB

  • memory/1936-2-0x000000001AC70000-0x000000001ACF0000-memory.dmp

    Filesize

    512KB

  • memory/1936-36-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

    Filesize

    9.9MB

  • memory/1936-37-0x000000001AC70000-0x000000001ACF0000-memory.dmp

    Filesize

    512KB

  • memory/1936-13543-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

    Filesize

    9.9MB