Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 06:00

General

  • Target

    4a73cda422ad15b602e335e08bcc80c8229755618256e2d9fd97585864a7ee1d.exe

  • Size

    293KB

  • MD5

    1781f77231c73088985f1c23c32d60e0

  • SHA1

    a5144af8b60fbdeef0b64b6a9093fcad4ef52882

  • SHA256

    4a73cda422ad15b602e335e08bcc80c8229755618256e2d9fd97585864a7ee1d

  • SHA512

    4e84bf85df34485ab439c1d44e2dfd7d39848fd6c290df87b8567b877f2cd0ff69658a34bc8581e4905dfc28984af84500017fd27de76189139d525e7454e26c

  • SSDEEP

    6144:DdY/wgq55cSWFJVlC9GVmf6naKbRlUHRY41Q2aaRpEx7gN7VvO:DdzgrJTC9qmW91CHtWNyv

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\4a73cda422ad15b602e335e08bcc80c8229755618256e2d9fd97585864a7ee1d.exe
        "C:\Users\Admin\AppData\Local\Temp\4a73cda422ad15b602e335e08bcc80c8229755618256e2d9fd97585864a7ee1d.exe"
        2⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Users\Admin\AppData\Local\Temp\4a73cda422ad15b602e335e08bcc80c8229755618256e2d9fd97585864a7ee1d.exe
          "C:\Users\Admin\AppData\Local\Temp\4a73cda422ad15b602e335e08bcc80c8229755618256e2d9fd97585864a7ee1d.exe"
          3⤵
            PID:1716

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\readme.eml

              Filesize

              14KB

              MD5

              85a3b7087c2f46f3597b1fa4eb79cc92

              SHA1

              cd062da0902c5ddb151f7df8e9d6e2e1410ff25e

              SHA256

              0a444c61c786aa7cad775bda0b8a844036caca73769fda592a89243397d7789d

              SHA512

              011f33d2e50ee7d06c6dcd83787f86853f62d8ab8d2318f5cf22c68bfc5f1046e2336b9fb1893a9959af3cc3a4b2390cc9ad0ea8571b4580065446b64f41cad6

            • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

              Filesize

              12KB

              MD5

              8156706568e77846b7bfbcc091c6ffeb

              SHA1

              792aa0db64f517520ee8f745bee71152532fe4d2

              SHA256

              5e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8

              SHA512

              8760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8

            • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

              Filesize

              8KB

              MD5

              7757fe48a0974cb625e89012c92cc995

              SHA1

              e4684021f14053c3f9526070dc687ff125251162

              SHA256

              c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03

              SHA512

              b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526

            • C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe

              Filesize

              451KB

              MD5

              8860856e9a2ebf67ccc70d2386177117

              SHA1

              1627d84a5bf6e4e3e3a964c0f6ee1b66161f3c14

              SHA256

              304856c09f49b7b153ab0bddfbac4cb3f4d1b74ad4b4389f6934ecf77fec2273

              SHA512

              eaeef526734ceacfe342839169e97cc8dc6659f9bdc74643d734f7d5ccfa8b9c40b4d20000186283fe6e0c93f3c264c56c4fc5d76739a67cf0420afb237c6c13

            • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe

              Filesize

              640KB

              MD5

              f00b6b1f372c77d3599d4be536b537a0

              SHA1

              4e26baf6fc9a990c3da1764b8a8f59f25ac6a63e

              SHA256

              a5288b71d9707519ff57cf43f13effe18ad0955092f3e495803cfdb3613c9857

              SHA512

              06f9f67d4ae495cdaf580760ee6ab21ba0ec71ef5945b7631684824ef628fb3b15dcb7887286c484eba584b8d6dbf554da819c9e171b7c124e8db9c260b20879

            • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

              Filesize

              640KB

              MD5

              3d1d93a692987ed161f61a46c16874c2

              SHA1

              ed7fd1d56534ec726efab58d53e983d5ec572300

              SHA256

              7c566166828729a61c5041b15fbb494b0faff75cc066989e48eacb2ed81eca44

              SHA512

              cfd490fe8480f83c93b330fa8a348c9a765a4ab94568ac1e74e7598d841fe5e616b29e16b6cb5de17ce7c81f0b16fa32e0ae7f791a522e7b0078d99ba7d89b65

            • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

              Filesize

              461KB

              MD5

              c97efec02aad9b06e3ee8b888751086f

              SHA1

              eb91c2a525517c5d24e7fc7b1e58648bf9aad9ba

              SHA256

              443b723e45199602f1e12a00ccc53861b8c3b636feee3ad248c878d66064239f

              SHA512

              664f59055b955583635a3a6359b4379b3c914166188b00e30bde903be15a1a452d8c624de57eb0f281944da73919c29646f6d3e639b41ba5df3173e26f8d330e

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              9KB

              MD5

              68ec8dcf72394e6446e51c338a20f9ec

              SHA1

              011d12b3f8a815e1892d0e93fb7c467b95b7dd48

              SHA256

              4eba47fb4caa1db8ea418cf8ea3c6a689a1b83b8e0afc9f03f03849348447c2c

              SHA512

              4caf3ae4d2d4ca604e497ac0b03f1b41f1e80f5207708baaf0e17c24cc37751253d4e6d6dcd71aa76107e8943ed8d8f2bb73f4eec489bbafc30ccf6b3153a8df

            • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe

              Filesize

              461KB

              MD5

              bb7dfa174e2dd2265a401256636e3829

              SHA1

              b4fdcb87e762dde202fa69cfb01dc840e478fe80

              SHA256

              b7f6bc25dec81f5113618ee5cc4e6be129562b904f66c0a9d95d5402b53eb60f

              SHA512

              a99e7b051874b7385a6ed9605bd3c00ab4e5714c8b5e2479357e720b9d46870e416a1e33cad45a36c3c3440e642bb8b24e3cd1aeb158166e416bcbf142153098

            • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

              Filesize

              152KB

              MD5

              a399ccb6633647b97c1efb9b9263ef2e

              SHA1

              af72f21d7355e608808c7b67ba3ee7dc86718036

              SHA256

              a59150a46399da9c06eaf1bc95a8047725efee891dfdf7fb19a1de03cb2b2911

              SHA512

              eab36b3cfc24dae6e19467637a2f48b6919bef1edcc180ba01093ad8f4398aa84a65d801ecee89659c1ae9919bd629d1b9433deb8533192ab01b00bd79b513c1

            • C:\Windows\SysWOW64\runouce.exe

              Filesize

              10KB

              MD5

              f5f65ae6120530feb2c613016b3e4500

              SHA1

              bc6260fa311cb0181352300449440426c62bc7bd

              SHA256

              b4743c4ba1d0a6b04d8c09a7bb6bf68b100bb3e10b9f4b9ccfed7a7bc4b00e66

              SHA512

              4a53a3c4417fff16f43a7658a45903065918688223cc2cf9ccd22d6a7d3ae9e55fde89b2f8bc80ed0f45bfa05db60d4455fcccec7f63c03d9893d56e7cb05381

            • C:\vcredist2010_x86.log.html

              Filesize

              81KB

              MD5

              5a9bd5b0da0a3398d7f64dde39a037de

              SHA1

              9ef59c202c1981f25f65e791275e3ed0e1ee9680

              SHA256

              b71ad9a49470c17a51c4028b8a4cd9002b4e8c2e099a7bc93b8d79e879198965

              SHA512

              510da3837443e3339d102b3034cf88b9058d14e730618a23e0c86619b2ad9760711459a1118d6d9adcac42a8abc9a75ffef845b05c92b0d85092721b3b110f74

            • memory/1260-4-0x00000000025D0000-0x00000000025D1000-memory.dmp

              Filesize

              4KB

            • memory/1260-5-0x00000000025D0000-0x00000000025D1000-memory.dmp

              Filesize

              4KB

            • memory/1716-2-0x0000000000400000-0x0000000000450000-memory.dmp

              Filesize

              320KB

            • memory/1716-134-0x0000000000400000-0x0000000000450000-memory.dmp

              Filesize

              320KB

            • memory/1716-135-0x00000000002E0000-0x00000000002E6000-memory.dmp

              Filesize

              24KB

            • memory/2172-454-0x0000000000400000-0x0000000000450000-memory.dmp

              Filesize

              320KB

            • memory/2172-0-0x0000000000400000-0x0000000000450000-memory.dmp

              Filesize

              320KB

            • memory/2172-1-0x0000000000230000-0x0000000000280000-memory.dmp

              Filesize

              320KB