Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 09:46

General

  • Target

    14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe

  • Size

    6.6MB

  • MD5

    5f6aacd3106f727d45c295fd0f25054d

  • SHA1

    0d584d72fe321332df0b0a17720191ad96737f47

  • SHA256

    14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196

  • SHA512

    8eaa103be426a037b5ee1b99b0949672af1b674491dab8d5f24f5bf6f13e5817800574c0c779d54ef1f9ada7a6150ba3a6a63bf90eb6a5885465f6e2275764b0

  • SSDEEP

    98304:QSiEgahK0fCLAeApJe/i7t5/xPUa5BDul4X0CnewymF+ATMM9LWmZSWNQs5Ia/Ba:T/PfCEl5o3TwymFrX9L5sWB0Uy

Malware Config

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 1 IoCs
  • OutSteel

    OutSteel is a file uploader and document stealer written in AutoIT.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe
    "C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\is-O9H5R.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-O9H5R.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp" /SL5="$B0050,6104050,943104,C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3788
      • C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe
        "C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe" /VERYSILENT
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Users\Admin\AppData\Local\Temp\is-PNISQ.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-PNISQ.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp" /SL5="$9004A,6104050,943104,C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe" /VERYSILENT
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4708
          • C:\Users\Admin\AppData\Roaming\mX Parser\mathparser.exe
            "C:\Users\Admin\AppData\Roaming\mX Parser\mathparser.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Enumerates connected drives
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2168
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A
              6⤵
                PID:3876
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A
                6⤵
                  PID:2452
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A
                  6⤵
                    PID:3740
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
                    6⤵
                      PID:4924
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A
                      6⤵
                        PID:748
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A
                        6⤵
                          PID:4548
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A
                          6⤵
                            PID:5036
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
                            6⤵
                              PID:4156
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A
                              6⤵
                                PID:3492
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A
                                6⤵
                                  PID:4220
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A
                                  6⤵
                                    PID:3460
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A
                                    6⤵
                                      PID:5092
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A
                                      6⤵
                                        PID:1248
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A
                                        6⤵
                                          PID:3468
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A
                                          6⤵
                                            PID:4632
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A
                                            6⤵
                                              PID:3296
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A
                                              6⤵
                                                PID:4056
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A
                                                6⤵
                                                  PID:1396
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
                                        1⤵
                                          PID:1940

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\is-O9H5R.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp

                                          Filesize

                                          3.1MB

                                          MD5

                                          10a0c7f88554ff904404989bb8a504ea

                                          SHA1

                                          dc810dc1f2bf2dc37f69669e6c8e588943053a49

                                          SHA256

                                          596b99105a085e245e744c4d0c49fd7260616c0849d80d485986f2773c387a4b

                                          SHA512

                                          0a9b45796fb4b0d710d48fe1b730cefd4ccca9b9c16d627d5eb443b22661bb948151a7d6d478106196ef6e956d099b03c6d376abca2a32a7424ea6c2d5ff2dc4

                                        • C:\Users\Admin\AppData\Roaming\mX Parser\JxCnv40.dll

                                          Filesize

                                          3.1MB

                                          MD5

                                          7052d63610b063c859af7f128a0c05cd

                                          SHA1

                                          7d44391b76368b8331c4f468f8ddbaf6ee5a6793

                                          SHA256

                                          6e3917257f9239ff1c0ec0c17a7d9b6b01dead526c56218a11b0676174440112

                                          SHA512

                                          8d34fdd4a48835b6db7ceda48716959e8c50bee04d10aa66044a880a78c13760cf314781f8e347644c5a2d71ff467577e431c70beaafcd52db72cb8044c9bc05

                                        • C:\Users\Admin\AppData\Roaming\mX Parser\libics4.0.dll

                                          Filesize

                                          1.4MB

                                          MD5

                                          28267ea322e3975f1e98c64a1c77f509

                                          SHA1

                                          e1d92e085df142d703ed9fd9c65ed92562a759fa

                                          SHA256

                                          18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f

                                          SHA512

                                          2c0bd061a51e48c057fdd0b05dc959c48e79ef3df3ca1abec105b8be2aa53f416f92c109c23029a11d4d3e7e75529215877d41b5bfe5d462d844b3bae29c1a42

                                        • C:\Users\Admin\AppData\Roaming\mX Parser\manual.pdf

                                          Filesize

                                          2.2MB

                                          MD5

                                          079766094541035de5f115a9bbb4f583

                                          SHA1

                                          8423b25054aa78535c49042295558f33d34deae1

                                          SHA256

                                          6434913278186cb5b12ca38580a4e94b2ce2af83a836f7e50ab9c5ea8e265a59

                                          SHA512

                                          35b56c24d0b8aa2fec31ab9f329a1bfee15d97eb4fcce795e08bd15c5fd31726aae91c16bce0e1956cc2bbc2b529ace18212b09f47668e540f72079398dd3426

                                        • C:\Users\Admin\AppData\Roaming\mX Parser\mathparser.exe

                                          Filesize

                                          5.9MB

                                          MD5

                                          5d735d8c7243f61a30f5e91539f76df9

                                          SHA1

                                          26474ba449682e82ca38fef32836dcb23ee24012

                                          SHA256

                                          f00b523635707cf97be5877c9dea1abec7abf8d0e6bcce529cc96826344511a0

                                          SHA512

                                          a7bc38389f8905bc98a3742243fa1fd810241908578656c509c022855aeb1c97b8a3519456488b9cdef3e8b64824f8d2bb48e846d5b0f63e3b7d38041220b13f

                                        • C:\Users\Admin\Downloads\installation.exe

                                          Filesize

                                          20KB

                                          MD5

                                          345e3700c5b584ca43a6748670480864

                                          SHA1

                                          90802b6139b4ad5c8b218e137af9e5466ad4d0fa

                                          SHA256

                                          e952eeacb54e0d9c07da6db899c7012b49cfd19b19ec46b99321ebe831b53a7c

                                          SHA512

                                          0c17385d336dd25b36e06c2c323694ec43683bf6c179985989eadd680df190bda220ddbd4afa548d6827877fdcfde06f67fd692ebe37653b574d00f5e377a566

                                        • memory/1520-10-0x0000000000400000-0x00000000004F4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/1520-595-0x0000000000400000-0x00000000004F4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/2168-615-0x0000000000E60000-0x000000000171B000-memory.dmp

                                          Filesize

                                          8.7MB

                                        • memory/2168-613-0x0000000000E60000-0x000000000171B000-memory.dmp

                                          Filesize

                                          8.7MB

                                        • memory/2168-617-0x0000000000E60000-0x000000000171B000-memory.dmp

                                          Filesize

                                          8.7MB

                                        • memory/2168-589-0x0000000000E60000-0x000000000171B000-memory.dmp

                                          Filesize

                                          8.7MB

                                        • memory/2168-612-0x0000000000E60000-0x000000000171B000-memory.dmp

                                          Filesize

                                          8.7MB

                                        • memory/2168-619-0x0000000000E60000-0x000000000171B000-memory.dmp

                                          Filesize

                                          8.7MB

                                        • memory/2168-597-0x0000000000E60000-0x000000000171B000-memory.dmp

                                          Filesize

                                          8.7MB

                                        • memory/3788-6-0x0000000000D50000-0x0000000000D51000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3788-13-0x0000000000400000-0x000000000072D000-memory.dmp

                                          Filesize

                                          3.2MB

                                        • memory/4476-0-0x0000000000400000-0x00000000004F4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/4476-2-0x0000000000400000-0x00000000004F4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/4476-17-0x0000000000400000-0x00000000004F4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/4708-19-0x00000000008D0000-0x00000000008D1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4708-593-0x0000000000400000-0x000000000072D000-memory.dmp

                                          Filesize

                                          3.2MB