Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe
Resource
win7-20240221-en
General
-
Target
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe
-
Size
6.6MB
-
MD5
5f6aacd3106f727d45c295fd0f25054d
-
SHA1
0d584d72fe321332df0b0a17720191ad96737f47
-
SHA256
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196
-
SHA512
8eaa103be426a037b5ee1b99b0949672af1b674491dab8d5f24f5bf6f13e5817800574c0c779d54ef1f9ada7a6150ba3a6a63bf90eb6a5885465f6e2275764b0
-
SSDEEP
98304:QSiEgahK0fCLAeApJe/i7t5/xPUa5BDul4X0CnewymF+ATMM9LWmZSWNQs5Ia/Ba:T/PfCEl5o3TwymFrX9L5sWB0Uy
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\mX Parser\manual.pdf family_babadeda -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmpmathparser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation mathparser.exe -
Executes dropped EXE 3 IoCs
Processes:
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmpmathparser.exepid process 3788 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 4708 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 2168 mathparser.exe -
Loads dropped DLL 2 IoCs
Processes:
mathparser.exepid process 2168 mathparser.exe 2168 mathparser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
mathparser.exedescription ioc process File opened (read-only) \??\k: mathparser.exe File opened (read-only) \??\m: mathparser.exe File opened (read-only) \??\p: mathparser.exe File opened (read-only) \??\q: mathparser.exe File opened (read-only) \??\a: mathparser.exe File opened (read-only) \??\e: mathparser.exe File opened (read-only) \??\g: mathparser.exe File opened (read-only) \??\h: mathparser.exe File opened (read-only) \??\r: mathparser.exe File opened (read-only) \??\s: mathparser.exe File opened (read-only) \??\t: mathparser.exe File opened (read-only) \??\w: mathparser.exe File opened (read-only) \??\o: mathparser.exe File opened (read-only) \??\x: mathparser.exe File opened (read-only) \??\y: mathparser.exe File opened (read-only) \??\z: mathparser.exe File opened (read-only) \??\b: mathparser.exe File opened (read-only) \??\i: mathparser.exe File opened (read-only) \??\l: mathparser.exe File opened (read-only) \??\n: mathparser.exe File opened (read-only) \??\j: mathparser.exe File opened (read-only) \??\u: mathparser.exe File opened (read-only) \??\v: mathparser.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2168-597-0x0000000000E60000-0x000000000171B000-memory.dmp autoit_exe behavioral2/memory/2168-612-0x0000000000E60000-0x000000000171B000-memory.dmp autoit_exe behavioral2/memory/2168-613-0x0000000000E60000-0x000000000171B000-memory.dmp autoit_exe behavioral2/memory/2168-615-0x0000000000E60000-0x000000000171B000-memory.dmp autoit_exe behavioral2/memory/2168-617-0x0000000000E60000-0x000000000171B000-memory.dmp autoit_exe behavioral2/memory/2168-619-0x0000000000E60000-0x000000000171B000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmppid process 4708 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 4708 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmppid process 4708 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
mathparser.exepid process 2168 mathparser.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmpmathparser.exedescription pid process target process PID 4476 wrote to memory of 3788 4476 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp PID 4476 wrote to memory of 3788 4476 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp PID 4476 wrote to memory of 3788 4476 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp PID 3788 wrote to memory of 1520 3788 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe PID 3788 wrote to memory of 1520 3788 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe PID 3788 wrote to memory of 1520 3788 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe PID 1520 wrote to memory of 4708 1520 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp PID 1520 wrote to memory of 4708 1520 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp PID 1520 wrote to memory of 4708 1520 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp PID 4708 wrote to memory of 2168 4708 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp mathparser.exe PID 4708 wrote to memory of 2168 4708 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp mathparser.exe PID 4708 wrote to memory of 2168 4708 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp mathparser.exe PID 2168 wrote to memory of 3876 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3876 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3876 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 2452 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 2452 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 2452 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3740 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3740 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3740 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4924 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4924 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4924 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 748 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 748 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 748 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4548 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4548 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4548 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 5036 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 5036 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 5036 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4156 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4156 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4156 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3492 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3492 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3492 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4220 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4220 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4220 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3460 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3460 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3460 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 5092 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 5092 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 5092 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 1248 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 1248 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 1248 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3468 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3468 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3468 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4632 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4632 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4632 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3296 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3296 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 3296 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4056 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4056 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 4056 2168 mathparser.exe cmd.exe PID 2168 wrote to memory of 1396 2168 mathparser.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\is-O9H5R.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp"C:\Users\Admin\AppData\Local\Temp\is-O9H5R.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp" /SL5="$B0050,6104050,943104,C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\is-PNISQ.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp"C:\Users\Admin\AppData\Local\Temp\is-PNISQ.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp" /SL5="$9004A,6104050,943104,C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe" /VERYSILENT4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\mX Parser\mathparser.exe"C:\Users\Admin\AppData\Roaming\mX Parser\mathparser.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A6⤵PID:3876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A6⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A6⤵PID:3740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A6⤵PID:4924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A6⤵PID:748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A6⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A6⤵PID:5036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A6⤵PID:4156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A6⤵PID:3492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A6⤵PID:4220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A6⤵PID:3460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A6⤵PID:5092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A6⤵PID:1248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A6⤵PID:3468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A6⤵PID:4632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A6⤵PID:3296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A6⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A6⤵PID:1396
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-O9H5R.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp
Filesize3.1MB
MD510a0c7f88554ff904404989bb8a504ea
SHA1dc810dc1f2bf2dc37f69669e6c8e588943053a49
SHA256596b99105a085e245e744c4d0c49fd7260616c0849d80d485986f2773c387a4b
SHA5120a9b45796fb4b0d710d48fe1b730cefd4ccca9b9c16d627d5eb443b22661bb948151a7d6d478106196ef6e956d099b03c6d376abca2a32a7424ea6c2d5ff2dc4
-
Filesize
3.1MB
MD57052d63610b063c859af7f128a0c05cd
SHA17d44391b76368b8331c4f468f8ddbaf6ee5a6793
SHA2566e3917257f9239ff1c0ec0c17a7d9b6b01dead526c56218a11b0676174440112
SHA5128d34fdd4a48835b6db7ceda48716959e8c50bee04d10aa66044a880a78c13760cf314781f8e347644c5a2d71ff467577e431c70beaafcd52db72cb8044c9bc05
-
Filesize
1.4MB
MD528267ea322e3975f1e98c64a1c77f509
SHA1e1d92e085df142d703ed9fd9c65ed92562a759fa
SHA25618f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f
SHA5122c0bd061a51e48c057fdd0b05dc959c48e79ef3df3ca1abec105b8be2aa53f416f92c109c23029a11d4d3e7e75529215877d41b5bfe5d462d844b3bae29c1a42
-
Filesize
2.2MB
MD5079766094541035de5f115a9bbb4f583
SHA18423b25054aa78535c49042295558f33d34deae1
SHA2566434913278186cb5b12ca38580a4e94b2ce2af83a836f7e50ab9c5ea8e265a59
SHA51235b56c24d0b8aa2fec31ab9f329a1bfee15d97eb4fcce795e08bd15c5fd31726aae91c16bce0e1956cc2bbc2b529ace18212b09f47668e540f72079398dd3426
-
Filesize
5.9MB
MD55d735d8c7243f61a30f5e91539f76df9
SHA126474ba449682e82ca38fef32836dcb23ee24012
SHA256f00b523635707cf97be5877c9dea1abec7abf8d0e6bcce529cc96826344511a0
SHA512a7bc38389f8905bc98a3742243fa1fd810241908578656c509c022855aeb1c97b8a3519456488b9cdef3e8b64824f8d2bb48e846d5b0f63e3b7d38041220b13f
-
Filesize
20KB
MD5345e3700c5b584ca43a6748670480864
SHA190802b6139b4ad5c8b218e137af9e5466ad4d0fa
SHA256e952eeacb54e0d9c07da6db899c7012b49cfd19b19ec46b99321ebe831b53a7c
SHA5120c17385d336dd25b36e06c2c323694ec43683bf6c179985989eadd680df190bda220ddbd4afa548d6827877fdcfde06f67fd692ebe37653b574d00f5e377a566