Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 11:24

General

  • Target

    b495ad8edaf6f8da1c38437a3d6c44c8.exe

  • Size

    72KB

  • MD5

    b495ad8edaf6f8da1c38437a3d6c44c8

  • SHA1

    1e98a8dc9421eae40037421bc332f86b224a5a39

  • SHA256

    ddd235cb2286fbf73341cfe720fce3b7616c1fd4f5b71dae23e3f5a08d4fb1ce

  • SHA512

    8036e3d4edf0d4f928498c354e49615bb3c70667ea8004ff84a9002ad7553237386e3d467f7f3588d084f9824996b6468a018c8af09f4a33aeea1e63703c5659

  • SSDEEP

    1536:p4q8Q1xZtffrb8sjPFNhTYsFFrzckH2fmitVVXC3adCA:qKtfDwsjPThTYszDH2fRCK7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\b495ad8edaf6f8da1c38437a3d6c44c8.exe
        "C:\Users\Admin\AppData\Local\Temp\b495ad8edaf6f8da1c38437a3d6c44c8.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a27FA.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1964
          • C:\Users\Admin\AppData\Local\Temp\b495ad8edaf6f8da1c38437a3d6c44c8.exe
            "C:\Users\Admin\AppData\Local\Temp\b495ad8edaf6f8da1c38437a3d6c44c8.exe"
            4⤵
            • Executes dropped EXE
            PID:2652
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\$$a27FA.bat

      Filesize

      530B

      MD5

      efff2e33f0620a1e26fef83619f4fc5f

      SHA1

      021ad953b8872da704b5c31acbf9d89d1c40f051

      SHA256

      7af59481119e4d7ad0ec4e5923dec354cda501ec0846430d32e7ebbc721fb5e4

      SHA512

      068269172ad5b11e6343f628b1ea5a8b2d8cedc4091a89fe9d9071b0886dfa1c4977e23f2ee205b45bdc62f590a75bcb8dc931028dfbe2e9cf09a5375c3a1ce3

    • C:\Users\Admin\AppData\Local\Temp\b495ad8edaf6f8da1c38437a3d6c44c8.exe.exe

      Filesize

      14KB

      MD5

      24ef7650a464eb95f8a5bba03202a9ef

      SHA1

      fd6e36e45fda812ec49eb9a07ce8a6a2ed6cb70c

      SHA256

      290a6c952a8216276bea217b1de6a0e8e3150083fe3b441f3784acac02c77f51

      SHA512

      6402433d125f7e6b8478f2a06fa03e547adc95b18a6426324cbedb39a94ace3e7aa1605b3391b8cb0cf93cddfbc2eaecf781001e915f1546b9492bdebcae64db

    • C:\Windows\Logo1_.exe

      Filesize

      58KB

      MD5

      5f37f663a4fa45d381d07638032d024c

      SHA1

      ee3f57a5b28850c4ab25758174faca9ea1af40bd

      SHA256

      bdb0ef4eab81fe0e8d164e94ff78fea2c33a9578a9d8f0cf655240a2215c38ba

      SHA512

      fc6c77edf8bc56484ecb5354240bb9202a536fdb34596b6c1392641be4e762fba5dbe5e325f255d76566b5716684246fc75518c2bb29ea2235ff5a3f1f995485

    • memory/1184-20-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

      Filesize

      4KB

    • memory/1840-241-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2020-13-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB