Overview
overview
10Static
static
3750c447d6e...9c.exe
windows7-x64
10750c447d6e...9c.exe
windows10-2004-x64
10AudioManag...le.exe
windows7-x64
10AudioManag...le.exe
windows10-2004-x64
10Microsoft....ns.dll
windows7-x64
1Microsoft....ns.dll
windows10-2004-x64
1PocoInitializer.dll
windows7-x64
1PocoInitializer.dll
windows10-2004-x64
1System.Win...ty.dll
windows7-x64
1System.Win...ty.dll
windows10-2004-x64
1bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1bzip2.dll
windows7-x64
3bzip2.dll
windows10-2004-x64
3d3d10core.dll
windows10-2004-x64
1iconv.dll
windows7-x64
3iconv.dll
windows10-2004-x64
3libgthread-2.0-0.dll
windows7-x64
1libgthread-2.0-0.dll
windows10-2004-x64
1wxwidgetsforms2.dll
windows7-x64
10wxwidgetsforms2.dll
windows10-2004-x64
10xmlparse.dll
windows7-x64
1xmlparse.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
AudioManagementConsole.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
AudioManagementConsole.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Microsoft.Expression.Interactions.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Microsoft.Expression.Interactions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
PocoInitializer.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PocoInitializer.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral9
Sample
System.Windows.Interactivity.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
System.Windows.Interactivity.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
bass.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
bass.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
bzip2.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
bzip2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
d3d10core.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
iconv.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
iconv.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
libgthread-2.0-0.dll
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
libgthread-2.0-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
wxwidgetsforms2.dll
Resource
win7-20240319-en
Behavioral task
behavioral21
Sample
wxwidgetsforms2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
xmlparse.dll
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
xmlparse.dll
Resource
win10v2004-20240226-en
General
-
Target
AudioManagementConsole.exe
-
Size
2.6MB
-
MD5
54716603e1b2d01a507d5d0a3a3a104c
-
SHA1
93b0407a05891fb797e3083c374af2e0dfb30634
-
SHA256
595017621ccc2b26e23d39c720c6bfaf29aa17997b59a8ba7e4506eea252b8ed
-
SHA512
b3ea1beef7f4b05afc5405877282f5d9c3588fb2bd0cdaa5616b82cbd752dec471e6d87a5ea16a478e3a26500c764a2bd38fd0e02a354029dee4e023d261aff0
-
SSDEEP
49152:1ngd+5pMi88qiafG+aqVhTTRQMyLxe0n8CndcIx:1gd+5pMr8qRG+aqVhCSU
Malware Config
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral4/memory/5092-0-0x0000000003390000-0x0000000005490000-memory.dmp family_babadeda behavioral4/memory/5092-8-0x0000000003390000-0x0000000005490000-memory.dmp family_babadeda -
OutSteel batch script 1 IoCs
Detects batch script dropped by OutSteel
resource yara_rule behavioral4/files/0x000800000002322b-7.dat outsteel_batch_script -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: AudioManagementConsole.exe File opened (read-only) \??\n: AudioManagementConsole.exe File opened (read-only) \??\v: AudioManagementConsole.exe File opened (read-only) \??\z: AudioManagementConsole.exe File opened (read-only) \??\i: AudioManagementConsole.exe File opened (read-only) \??\k: AudioManagementConsole.exe File opened (read-only) \??\p: AudioManagementConsole.exe File opened (read-only) \??\x: AudioManagementConsole.exe File opened (read-only) \??\b: AudioManagementConsole.exe File opened (read-only) \??\l: AudioManagementConsole.exe File opened (read-only) \??\q: AudioManagementConsole.exe File opened (read-only) \??\s: AudioManagementConsole.exe File opened (read-only) \??\t: AudioManagementConsole.exe File opened (read-only) \??\a: AudioManagementConsole.exe File opened (read-only) \??\e: AudioManagementConsole.exe File opened (read-only) \??\j: AudioManagementConsole.exe File opened (read-only) \??\o: AudioManagementConsole.exe File opened (read-only) \??\r: AudioManagementConsole.exe File opened (read-only) \??\u: AudioManagementConsole.exe File opened (read-only) \??\w: AudioManagementConsole.exe File opened (read-only) \??\y: AudioManagementConsole.exe File opened (read-only) \??\g: AudioManagementConsole.exe File opened (read-only) \??\h: AudioManagementConsole.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/memory/5092-1-0x0000000000E50000-0x0000000001147000-memory.dmp autoit_exe behavioral4/memory/5092-6-0x0000000000E50000-0x0000000001147000-memory.dmp autoit_exe -
Kills process with taskkill 1 IoCs
pid Process 4400 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4400 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4728 5092 AudioManagementConsole.exe 97 PID 5092 wrote to memory of 4728 5092 AudioManagementConsole.exe 97 PID 5092 wrote to memory of 4728 5092 AudioManagementConsole.exe 97 PID 5092 wrote to memory of 4124 5092 AudioManagementConsole.exe 99 PID 5092 wrote to memory of 4124 5092 AudioManagementConsole.exe 99 PID 5092 wrote to memory of 4124 5092 AudioManagementConsole.exe 99 PID 5092 wrote to memory of 2964 5092 AudioManagementConsole.exe 101 PID 5092 wrote to memory of 2964 5092 AudioManagementConsole.exe 101 PID 5092 wrote to memory of 2964 5092 AudioManagementConsole.exe 101 PID 5092 wrote to memory of 928 5092 AudioManagementConsole.exe 103 PID 5092 wrote to memory of 928 5092 AudioManagementConsole.exe 103 PID 5092 wrote to memory of 928 5092 AudioManagementConsole.exe 103 PID 5092 wrote to memory of 4112 5092 AudioManagementConsole.exe 105 PID 5092 wrote to memory of 4112 5092 AudioManagementConsole.exe 105 PID 5092 wrote to memory of 4112 5092 AudioManagementConsole.exe 105 PID 5092 wrote to memory of 1336 5092 AudioManagementConsole.exe 107 PID 5092 wrote to memory of 1336 5092 AudioManagementConsole.exe 107 PID 5092 wrote to memory of 1336 5092 AudioManagementConsole.exe 107 PID 5092 wrote to memory of 3808 5092 AudioManagementConsole.exe 109 PID 5092 wrote to memory of 3808 5092 AudioManagementConsole.exe 109 PID 5092 wrote to memory of 3808 5092 AudioManagementConsole.exe 109 PID 5092 wrote to memory of 1132 5092 AudioManagementConsole.exe 111 PID 5092 wrote to memory of 1132 5092 AudioManagementConsole.exe 111 PID 5092 wrote to memory of 1132 5092 AudioManagementConsole.exe 111 PID 5092 wrote to memory of 4672 5092 AudioManagementConsole.exe 113 PID 5092 wrote to memory of 4672 5092 AudioManagementConsole.exe 113 PID 5092 wrote to memory of 4672 5092 AudioManagementConsole.exe 113 PID 5092 wrote to memory of 1920 5092 AudioManagementConsole.exe 115 PID 5092 wrote to memory of 1920 5092 AudioManagementConsole.exe 115 PID 5092 wrote to memory of 1920 5092 AudioManagementConsole.exe 115 PID 5092 wrote to memory of 3524 5092 AudioManagementConsole.exe 117 PID 5092 wrote to memory of 3524 5092 AudioManagementConsole.exe 117 PID 5092 wrote to memory of 3524 5092 AudioManagementConsole.exe 117 PID 5092 wrote to memory of 3656 5092 AudioManagementConsole.exe 119 PID 5092 wrote to memory of 3656 5092 AudioManagementConsole.exe 119 PID 5092 wrote to memory of 3656 5092 AudioManagementConsole.exe 119 PID 5092 wrote to memory of 312 5092 AudioManagementConsole.exe 121 PID 5092 wrote to memory of 312 5092 AudioManagementConsole.exe 121 PID 5092 wrote to memory of 312 5092 AudioManagementConsole.exe 121 PID 5092 wrote to memory of 1848 5092 AudioManagementConsole.exe 123 PID 5092 wrote to memory of 1848 5092 AudioManagementConsole.exe 123 PID 5092 wrote to memory of 1848 5092 AudioManagementConsole.exe 123 PID 5092 wrote to memory of 1812 5092 AudioManagementConsole.exe 125 PID 5092 wrote to memory of 1812 5092 AudioManagementConsole.exe 125 PID 5092 wrote to memory of 1812 5092 AudioManagementConsole.exe 125 PID 5092 wrote to memory of 3360 5092 AudioManagementConsole.exe 127 PID 5092 wrote to memory of 3360 5092 AudioManagementConsole.exe 127 PID 5092 wrote to memory of 3360 5092 AudioManagementConsole.exe 127 PID 5092 wrote to memory of 1984 5092 AudioManagementConsole.exe 129 PID 5092 wrote to memory of 1984 5092 AudioManagementConsole.exe 129 PID 5092 wrote to memory of 1984 5092 AudioManagementConsole.exe 129 PID 5092 wrote to memory of 4372 5092 AudioManagementConsole.exe 131 PID 5092 wrote to memory of 4372 5092 AudioManagementConsole.exe 131 PID 5092 wrote to memory of 4372 5092 AudioManagementConsole.exe 131 PID 5092 wrote to memory of 1576 5092 AudioManagementConsole.exe 133 PID 5092 wrote to memory of 1576 5092 AudioManagementConsole.exe 133 PID 5092 wrote to memory of 1576 5092 AudioManagementConsole.exe 133 PID 5092 wrote to memory of 4280 5092 AudioManagementConsole.exe 135 PID 5092 wrote to memory of 4280 5092 AudioManagementConsole.exe 135 PID 5092 wrote to memory of 4280 5092 AudioManagementConsole.exe 135 PID 5092 wrote to memory of 4604 5092 AudioManagementConsole.exe 137 PID 5092 wrote to memory of 4604 5092 AudioManagementConsole.exe 137 PID 5092 wrote to memory of 4604 5092 AudioManagementConsole.exe 137 PID 5092 wrote to memory of 3284 5092 AudioManagementConsole.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:4728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:4124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:2964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:1336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:3808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:4672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:1920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:3524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:3656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:1848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:3360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A2⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A2⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A2⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A2⤵PID:4604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A2⤵PID:3284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A2⤵PID:1228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A2⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A2⤵PID:4300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A2⤵PID:1516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A2⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A2⤵PID:3476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A2⤵PID:2952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A2⤵PID:4432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A2⤵PID:1064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A2⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A2⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A2⤵PID:1816
-
-
C:\Windows\SysWOW64\cmd.execmd /c start /min r.bat2⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K r.bat3⤵PID:3828
-
C:\Windows\SysWOW64\cmd.execmd /min /c del "C:\Users\Admin\AppData\Local\Temp\r.bat"4⤵PID:4800
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /IM cmd.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD5f6a86f75a098305a18cafbe90984fdb8
SHA10b2b5145b221487c975fb8a37894539f8af096b0
SHA256a28ad4e445a5069bb621efc516147c60248369f5fc100ee935974a9b556fb273
SHA512bee4c243f3a60f1778c5051d0a023afde678979a5da8db23f8811654afe468a06af6181c8338fc02d755dc223c52c653baa7abab8e941aac4cf335b7fabaac47