Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-04-2024 00:32

General

  • Target

    9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702.exe

  • Size

    354KB

  • MD5

    3b4779dbc67506f394af7bc270b47f41

  • SHA1

    98906d8afaf117fb4210447b9991a2f1def343af

  • SHA256

    9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702

  • SHA512

    da9d61f0a5dcf8bbc3a3b2fb2d332b9fce5ab677be7e81167b2bed9501c741419d95a3714c1be244a4c7d5e03e50218b65cc9680fc6849769d9c234541c57ddf

  • SSDEEP

    6144:oGHGRpO9p1om9+xs3NBBlsVmXqKM6m1kJS8QRhh24ojXG5RZnfA5MdcdlDT2tMdf:oGHasii9BlXqT6m9RhhrorKn4m6lDwvW

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702.exe
    "C:\Users\Admin\AppData\Local\Temp\9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702.exe
      "C:\Users\Admin\AppData\Local\Temp\9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702.exe
        "C:\Users\Admin\AppData\Local\Temp\9a02983210e7a7dcabb6f6b49b5867559ec9e0b5d2cf8569c9db380bbd9e0702.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\gay gay licking .zip.exe

    Filesize

    695KB

    MD5

    8f2c1c54facb9b8709531c3fd998a09c

    SHA1

    44b894b90aa0e7dd3ead73523c986865fb623060

    SHA256

    8303f7b001a45413c9045f206db5ec013bb0bf28c9ee66311f622d0b961904bf

    SHA512

    b0289064a2e7589d22810c2026d7518c328cd7ca7a4fec6084818638b854e3d0d7d5edd7396098d17e2e4be38f5dfa95a1c62fd3a7041be073fac34b203d5e69

  • C:\debug.txt

    Filesize

    183B

    MD5

    bed8e8b62c11807d977e1f10a83b9dcd

    SHA1

    cfd544e7eed16bcbac06458e5b7ddcf4250a3d2f

    SHA256

    d847ce2a701241e6c7a2a64d9e5b1c216e80d6318674bc1cbb6a8c1b21a1afe0

    SHA512

    66ca1ed4dad0bf77c5ba2943b30e1c6465dc85369e27d8b5943243c729cef54e9d817d5fb89ab36bff8187d8a3af841452b24723ce223d93fd88cb535346b1a8