Overview
overview
10Static
static
3750c447d6e...9c.exe
windows7-x64
10750c447d6e...9c.exe
windows10-2004-x64
10AudioManag...le.exe
windows7-x64
10AudioManag...le.exe
windows10-2004-x64
10Microsoft....ns.dll
windows7-x64
1Microsoft....ns.dll
windows10-2004-x64
1PocoInitializer.dll
windows7-x64
1PocoInitializer.dll
windows10-2004-x64
1System.Win...ty.dll
windows7-x64
1System.Win...ty.dll
windows10-2004-x64
1bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1bzip2.dll
windows7-x64
3bzip2.dll
windows10-2004-x64
3d3d10core.dll
windows10-2004-x64
1iconv.dll
windows7-x64
3iconv.dll
windows10-2004-x64
3libgthread-2.0-0.dll
windows7-x64
1libgthread-2.0-0.dll
windows10-2004-x64
1wxwidgetsforms2.dll
windows7-x64
10wxwidgetsforms2.dll
windows10-2004-x64
10xmlparse.dll
windows7-x64
1xmlparse.dll
windows10-2004-x64
1Analysis
-
max time kernel
90s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
AudioManagementConsole.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
AudioManagementConsole.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Microsoft.Expression.Interactions.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Microsoft.Expression.Interactions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
PocoInitializer.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PocoInitializer.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral9
Sample
System.Windows.Interactivity.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
System.Windows.Interactivity.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
bass.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
bass.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
bzip2.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
bzip2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
d3d10core.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
iconv.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
iconv.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
libgthread-2.0-0.dll
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
libgthread-2.0-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
wxwidgetsforms2.dll
Resource
win7-20240319-en
Behavioral task
behavioral21
Sample
wxwidgetsforms2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
xmlparse.dll
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
xmlparse.dll
Resource
win10v2004-20240226-en
General
-
Target
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe
-
Size
4.0MB
-
MD5
fd0ed9f5ffa9c912ba8d677687776448
-
SHA1
b7abe535dccf587c80cbcd2d4cc0c30e330b3a54
-
SHA256
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c
-
SHA512
dc40402b2f77a3148a2ce3d86561b67c9c64a5a5492d7e6591c1bd2cd25de5d5a7e999637802b530b684d230b904a38b97ed95614ed5069f7d3293ca87bcf219
-
SSDEEP
98304:E+CmYXmNfbqCePyvG02XIlnHNZvQkMkWmpWQ2Ga:EmumvGs/QVara
Malware Config
Signatures
-
Babadeda Crypter 3 IoCs
resource yara_rule behavioral2/files/0x0006000000023235-24.dat family_babadeda behavioral2/memory/4976-25-0x0000000003480000-0x0000000005580000-memory.dmp family_babadeda behavioral2/memory/4976-33-0x0000000003480000-0x0000000005580000-memory.dmp family_babadeda -
OutSteel batch script 1 IoCs
Detects batch script dropped by OutSteel
resource yara_rule behavioral2/files/0x0007000000023252-32.dat outsteel_batch_script -
Executes dropped EXE 1 IoCs
pid Process 4976 AudioManagementConsole.exe -
Loads dropped DLL 1 IoCs
pid Process 4976 AudioManagementConsole.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: AudioManagementConsole.exe File opened (read-only) \??\a: AudioManagementConsole.exe File opened (read-only) \??\b: AudioManagementConsole.exe File opened (read-only) \??\g: AudioManagementConsole.exe File opened (read-only) \??\h: AudioManagementConsole.exe File opened (read-only) \??\z: AudioManagementConsole.exe File opened (read-only) \??\k: AudioManagementConsole.exe File opened (read-only) \??\o: AudioManagementConsole.exe File opened (read-only) \??\p: AudioManagementConsole.exe File opened (read-only) \??\y: AudioManagementConsole.exe File opened (read-only) \??\v: AudioManagementConsole.exe File opened (read-only) \??\x: AudioManagementConsole.exe File opened (read-only) \??\i: AudioManagementConsole.exe File opened (read-only) \??\l: AudioManagementConsole.exe File opened (read-only) \??\t: AudioManagementConsole.exe File opened (read-only) \??\u: AudioManagementConsole.exe File opened (read-only) \??\q: AudioManagementConsole.exe File opened (read-only) \??\r: AudioManagementConsole.exe File opened (read-only) \??\s: AudioManagementConsole.exe File opened (read-only) \??\e: AudioManagementConsole.exe File opened (read-only) \??\j: AudioManagementConsole.exe File opened (read-only) \??\m: AudioManagementConsole.exe File opened (read-only) \??\n: AudioManagementConsole.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4976-26-0x0000000000A60000-0x0000000000D57000-memory.dmp autoit_exe behavioral2/memory/4976-31-0x0000000000A60000-0x0000000000D57000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2492 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 4976 2144 750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe 85 PID 2144 wrote to memory of 4976 2144 750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe 85 PID 2144 wrote to memory of 4976 2144 750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe 85 PID 4976 wrote to memory of 2800 4976 AudioManagementConsole.exe 94 PID 4976 wrote to memory of 2800 4976 AudioManagementConsole.exe 94 PID 4976 wrote to memory of 2800 4976 AudioManagementConsole.exe 94 PID 4976 wrote to memory of 620 4976 AudioManagementConsole.exe 96 PID 4976 wrote to memory of 620 4976 AudioManagementConsole.exe 96 PID 4976 wrote to memory of 620 4976 AudioManagementConsole.exe 96 PID 4976 wrote to memory of 4792 4976 AudioManagementConsole.exe 98 PID 4976 wrote to memory of 4792 4976 AudioManagementConsole.exe 98 PID 4976 wrote to memory of 4792 4976 AudioManagementConsole.exe 98 PID 4976 wrote to memory of 4980 4976 AudioManagementConsole.exe 100 PID 4976 wrote to memory of 4980 4976 AudioManagementConsole.exe 100 PID 4976 wrote to memory of 4980 4976 AudioManagementConsole.exe 100 PID 4976 wrote to memory of 1204 4976 AudioManagementConsole.exe 102 PID 4976 wrote to memory of 1204 4976 AudioManagementConsole.exe 102 PID 4976 wrote to memory of 1204 4976 AudioManagementConsole.exe 102 PID 4976 wrote to memory of 4488 4976 AudioManagementConsole.exe 104 PID 4976 wrote to memory of 4488 4976 AudioManagementConsole.exe 104 PID 4976 wrote to memory of 4488 4976 AudioManagementConsole.exe 104 PID 4976 wrote to memory of 3144 4976 AudioManagementConsole.exe 106 PID 4976 wrote to memory of 3144 4976 AudioManagementConsole.exe 106 PID 4976 wrote to memory of 3144 4976 AudioManagementConsole.exe 106 PID 4976 wrote to memory of 2076 4976 AudioManagementConsole.exe 108 PID 4976 wrote to memory of 2076 4976 AudioManagementConsole.exe 108 PID 4976 wrote to memory of 2076 4976 AudioManagementConsole.exe 108 PID 4976 wrote to memory of 1420 4976 AudioManagementConsole.exe 110 PID 4976 wrote to memory of 1420 4976 AudioManagementConsole.exe 110 PID 4976 wrote to memory of 1420 4976 AudioManagementConsole.exe 110 PID 4976 wrote to memory of 1384 4976 AudioManagementConsole.exe 112 PID 4976 wrote to memory of 1384 4976 AudioManagementConsole.exe 112 PID 4976 wrote to memory of 1384 4976 AudioManagementConsole.exe 112 PID 4976 wrote to memory of 4176 4976 AudioManagementConsole.exe 114 PID 4976 wrote to memory of 4176 4976 AudioManagementConsole.exe 114 PID 4976 wrote to memory of 4176 4976 AudioManagementConsole.exe 114 PID 4976 wrote to memory of 3712 4976 AudioManagementConsole.exe 116 PID 4976 wrote to memory of 3712 4976 AudioManagementConsole.exe 116 PID 4976 wrote to memory of 3712 4976 AudioManagementConsole.exe 116 PID 4976 wrote to memory of 4692 4976 AudioManagementConsole.exe 118 PID 4976 wrote to memory of 4692 4976 AudioManagementConsole.exe 118 PID 4976 wrote to memory of 4692 4976 AudioManagementConsole.exe 118 PID 4976 wrote to memory of 892 4976 AudioManagementConsole.exe 120 PID 4976 wrote to memory of 892 4976 AudioManagementConsole.exe 120 PID 4976 wrote to memory of 892 4976 AudioManagementConsole.exe 120 PID 4976 wrote to memory of 2032 4976 AudioManagementConsole.exe 122 PID 4976 wrote to memory of 2032 4976 AudioManagementConsole.exe 122 PID 4976 wrote to memory of 2032 4976 AudioManagementConsole.exe 122 PID 4976 wrote to memory of 4520 4976 AudioManagementConsole.exe 124 PID 4976 wrote to memory of 4520 4976 AudioManagementConsole.exe 124 PID 4976 wrote to memory of 4520 4976 AudioManagementConsole.exe 124 PID 4976 wrote to memory of 228 4976 AudioManagementConsole.exe 126 PID 4976 wrote to memory of 228 4976 AudioManagementConsole.exe 126 PID 4976 wrote to memory of 228 4976 AudioManagementConsole.exe 126 PID 4976 wrote to memory of 1040 4976 AudioManagementConsole.exe 128 PID 4976 wrote to memory of 1040 4976 AudioManagementConsole.exe 128 PID 4976 wrote to memory of 1040 4976 AudioManagementConsole.exe 128 PID 4976 wrote to memory of 3056 4976 AudioManagementConsole.exe 130 PID 4976 wrote to memory of 3056 4976 AudioManagementConsole.exe 130 PID 4976 wrote to memory of 3056 4976 AudioManagementConsole.exe 130 PID 4976 wrote to memory of 3216 4976 AudioManagementConsole.exe 132 PID 4976 wrote to memory of 3216 4976 AudioManagementConsole.exe 132 PID 4976 wrote to memory of 3216 4976 AudioManagementConsole.exe 132 PID 4976 wrote to memory of 2364 4976 AudioManagementConsole.exe 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe"C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exeC:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:2800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:4792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:4980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:4488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:3144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:1420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:1384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:4176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:3712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:4692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:4520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A3⤵PID:1040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A3⤵PID:3056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A3⤵PID:3216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A3⤵PID:2364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A3⤵PID:3736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A3⤵PID:1820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A3⤵PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A3⤵PID:4532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A3⤵PID:4772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A3⤵PID:1260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A3⤵PID:3708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A3⤵PID:672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A3⤵PID:1704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A3⤵PID:3752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A3⤵PID:2500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A3⤵PID:4652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A3⤵PID:3748
-
-
C:\Windows\SysWOW64\cmd.execmd /c start /min r.bat3⤵PID:756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K r.bat4⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /min /c del "C:\Users\Admin\Tools\ICUAudioSoftware\r.bat"5⤵PID:4316
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /IM cmd.exe /F5⤵
- Kills process with taskkill
PID:2492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD554716603e1b2d01a507d5d0a3a3a104c
SHA193b0407a05891fb797e3083c374af2e0dfb30634
SHA256595017621ccc2b26e23d39c720c6bfaf29aa17997b59a8ba7e4506eea252b8ed
SHA512b3ea1beef7f4b05afc5405877282f5d9c3588fb2bd0cdaa5616b82cbd752dec471e6d87a5ea16a478e3a26500c764a2bd38fd0e02a354029dee4e023d261aff0
-
Filesize
172B
MD5f6a86f75a098305a18cafbe90984fdb8
SHA10b2b5145b221487c975fb8a37894539f8af096b0
SHA256a28ad4e445a5069bb621efc516147c60248369f5fc100ee935974a9b556fb273
SHA512bee4c243f3a60f1778c5051d0a023afde678979a5da8db23f8811654afe468a06af6181c8338fc02d755dc223c52c653baa7abab8e941aac4cf335b7fabaac47
-
Filesize
1.7MB
MD5b226fcb1d5fc245b5ad372151ea33ed8
SHA1ac6941c5234179a2bc8306b238413a1c740fdcfa
SHA256daa273100ae0fdfa7aae5c6687c0e8130a68a7abae55c8380b38b9278e2c18a9
SHA512786f2398e114e02dac925c088774a2ed895546978f1b3cb6cc944efdeabf1ec5458136caf09c3932014fbfdf0ab43fae11c11aad35f53dcbcec4b408efc8017f
-
Filesize
2.0MB
MD59e11ac70407744bea597411f505d16b8
SHA190fddf31c2def7b655742a0f98181ee47b2835c8
SHA25669977ef94e7abde5e40ebb1b2d639e3ae396c831a0b8671bdcd141f5f101a344
SHA512fb68fa59897d95d1a909fcb32876efcc53880fbb804ad3ebbc97fbd4eee0cf4364f43517e92245754975a1c00ecca032b06efa03791d7179f1eb6d08620cde64