Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-04-2024 01:12

General

  • Target

    a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe

  • Size

    1.1MB

  • MD5

    440a4e4c05b633ae2c2965c8f932858d

  • SHA1

    ae1d400a6bc52e9b0c37714be6e3ec6df9b636b4

  • SHA256

    a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0

  • SHA512

    606624586d2a2f2864e498359dccb772bd922a347e58d6f5427f085b39910d7eb89cb576ab3751d308561c8f4dc8f778d3f1e169dbdb5c24d60a4ca7112a1b0c

  • SSDEEP

    24576:pWA1S/AfoRURd9GLS7XbcUfTzLqv3aH8csYeVa0eJmPx5LcSm4TH3k:YA1S/AfTICXIWTqf+dsN3dZlcTWk

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe
    "C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe
      "C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe
        "C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4572
    • C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe
      "C:\Users\Admin\AppData\Local\Temp\a6f79f827c241031e219573cdae006eddf352f7eb00528e6cb52a2bbae0a9af0.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\beast [bangbus] .mpg.exe

    Filesize

    1.1MB

    MD5

    ac9df4fdcbc9fe38d62caaea3f0f18ab

    SHA1

    3100ade88cefa9f9bd3edefeb474c87cbabb40cf

    SHA256

    b52690fd23a0d14785a121a7fedb77130708c3e14534073c0978908127d1db2c

    SHA512

    4bc103df9320216282ebbaf352231d0ab9de8c70085375e81249039947e81215795f4d413141d2c94030ebffbec2fadd3b6179610791fa829209ac5f5115cc99

  • memory/3292-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3292-185-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4260-189-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4572-190-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4948-188-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB