Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 22:46

General

  • Target

    6a03af0f09818c405bea61cc21b6581f.exe

  • Size

    106KB

  • MD5

    6a03af0f09818c405bea61cc21b6581f

  • SHA1

    ef577f8861f1f126f5afd7a02ad1e033f93b6e66

  • SHA256

    c6f9bf01583b17a4dbbee494ebdd901aa3b12723ebef43d5e39fbbb7936b2e23

  • SHA512

    c7947facd23c6779a4f5fc824b64c8429a6a30756396d65c9d0246b4fc68ffdd86501f9d0f50d56f396b6c75ad3d07f92008b982560d0f3bd8a0373e1563cf0f

  • SSDEEP

    3072:oGqIGRpTa9p1om9PW/pqqsFUCN3R9MI+I0ZfG:oGHGRpO9p1om9+xs3NBBSG

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a03af0f09818c405bea61cc21b6581f.exe
    "C:\Users\Admin\AppData\Local\Temp\6a03af0f09818c405bea61cc21b6581f.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\6a03af0f09818c405bea61cc21b6581f.exe
      "C:\Users\Admin\AppData\Local\Temp\6a03af0f09818c405bea61cc21b6581f.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Users\Admin\AppData\Local\Temp\6a03af0f09818c405bea61cc21b6581f.exe
        "C:\Users\Admin\AppData\Local\Temp\6a03af0f09818c405bea61cc21b6581f.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\gay voyeur hole black hairunshaved .rar.exe

    Filesize

    997KB

    MD5

    e8847c40b97d4f1d32efc0d5a450614e

    SHA1

    3285027cf9fd5cd71c9f2672701a929efde98a0c

    SHA256

    5354224f0e21348d2b330775fda271c14833c243371142e5b5b462039e185784

    SHA512

    0860d28d32958c3decee4d778d30c0a26ab6776bea8f53c4d0d6911e5c0fccba9fef6f67c5f1c0a100484e22705e1c8323879d6652031efd91429755de027761