Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 20:38

General

  • Target

    5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6.exe

  • Size

    1.8MB

  • MD5

    081811c7a077c739d56406c9c9c1ed54

  • SHA1

    b3390bfaeadec60efdc67c683d3e33e8baaa46cb

  • SHA256

    5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6

  • SHA512

    f61c946674e9caa4831a61862992ed6a20c2e22a0da1d4c9ca34207466f4e9aeeb53a75a971cb4d055018a94024f441ca4dec111ce47fdfde8a5e0ade78d7a67

  • SSDEEP

    24576:lq8DGJnMu1jEqxvy8rP3xe6BtLobxgLZ7AyIh4P+8zbT6fGpudmLTWJ61W7:bGJnr53ck3x3zcbAZ7xpVzCepjSJf

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 18 IoCs
  • UPX dump on OEP (original entry point) 21 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6.exe
    "C:\Users\Admin\AppData\Local\Temp\5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6.exe
      "C:\Users\Admin\AppData\Local\Temp\5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6.exe
        "C:\Users\Admin\AppData\Local\Temp\5686f0e97018e682402530ce15a2ea3595e07f4219ba203becd7bb767b110fc6.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\tyrkish cumshot beast public .mpg.exe

    Filesize

    645KB

    MD5

    eb2b7add222113a6f74a0671a6e22599

    SHA1

    efa4f0a5f21c7969a5008baea438a81b0281cd18

    SHA256

    7de6f81e5d5d8673963af444d1ffdc3b523688d3c4381ab7da6780cbbbfc2491

    SHA512

    920fe64cd7542b4133b00561b99860f602b2799ef21526ef018e8273f509dbc4329ac1026bea63af01b552081450532e168fb86f17406a2bfe848eff3cdbd79b

  • C:\debug.txt

    Filesize

    183B

    MD5

    9c6ad8bbacbd4cd1fa89321096fea2b9

    SHA1

    cfb1e657a47a360e7a5b73b68cf3d16120511fb5

    SHA256

    1d2c5a0157f63edbdc08ea5eac5a6e02775f9d9e3fbb2bc383d612cfbf2909ef

    SHA512

    a1c4f12b9568f8377ef8ae8bf645326961086c8f6042900dea3419ffae9dfe4b283a7048a5cfa796359aae9dd2bfc955c74c46ea5d2f7f82833098ff733585ec

  • memory/2372-124-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-95-0x00000000045B0000-0x00000000045CC000-memory.dmp

    Filesize

    112KB

  • memory/2372-144-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-79-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-141-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-138-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-92-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-105-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-102-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-135-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-132-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-98-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-93-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-10-0x00000000045B0000-0x00000000045CC000-memory.dmp

    Filesize

    112KB

  • memory/2372-118-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-121-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2372-129-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2500-91-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2500-55-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2636-54-0x00000000047E0000-0x00000000047FC000-memory.dmp

    Filesize

    112KB

  • memory/2636-97-0x00000000047E0000-0x00000000047FC000-memory.dmp

    Filesize

    112KB

  • memory/2636-90-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB