Overview
overview
10Static
static
3750c447d6e...9c.exe
windows7-x64
10750c447d6e...9c.exe
windows10-2004-x64
10AudioManag...le.exe
windows7-x64
10AudioManag...le.exe
windows10-2004-x64
10Microsoft....ns.dll
windows7-x64
1Microsoft....ns.dll
windows10-2004-x64
1PocoInitializer.dll
windows7-x64
1PocoInitializer.dll
windows10-2004-x64
1System.Win...ty.dll
windows7-x64
1System.Win...ty.dll
windows10-2004-x64
1bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1bzip2.dll
windows7-x64
3bzip2.dll
windows10-2004-x64
3d3d10core.dll
windows10-2004-x64
1iconv.dll
windows7-x64
3iconv.dll
windows10-2004-x64
3libgthread-2.0-0.dll
windows7-x64
1libgthread-2.0-0.dll
windows10-2004-x64
1wxwidgetsforms2.dll
windows7-x64
10wxwidgetsforms2.dll
windows10-2004-x64
10xmlparse.dll
windows7-x64
1xmlparse.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
AudioManagementConsole.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
AudioManagementConsole.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Microsoft.Expression.Interactions.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Microsoft.Expression.Interactions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
PocoInitializer.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PocoInitializer.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral9
Sample
System.Windows.Interactivity.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
System.Windows.Interactivity.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
bass.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
bass.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
bzip2.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
bzip2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
d3d10core.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
iconv.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
iconv.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
libgthread-2.0-0.dll
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
libgthread-2.0-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
wxwidgetsforms2.dll
Resource
win7-20240319-en
Behavioral task
behavioral21
Sample
wxwidgetsforms2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
xmlparse.dll
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
xmlparse.dll
Resource
win10v2004-20240226-en
General
-
Target
AudioManagementConsole.exe
-
Size
2.6MB
-
MD5
54716603e1b2d01a507d5d0a3a3a104c
-
SHA1
93b0407a05891fb797e3083c374af2e0dfb30634
-
SHA256
595017621ccc2b26e23d39c720c6bfaf29aa17997b59a8ba7e4506eea252b8ed
-
SHA512
b3ea1beef7f4b05afc5405877282f5d9c3588fb2bd0cdaa5616b82cbd752dec471e6d87a5ea16a478e3a26500c764a2bd38fd0e02a354029dee4e023d261aff0
-
SSDEEP
49152:1ngd+5pMi88qiafG+aqVhTTRQMyLxe0n8CndcIx:1gd+5pMr8qRG+aqVhCSU
Malware Config
Signatures
-
Babadeda Crypter 2 IoCs
Processes:
resource yara_rule behavioral4/memory/5092-0-0x0000000003390000-0x0000000005490000-memory.dmp family_babadeda behavioral4/memory/5092-8-0x0000000003390000-0x0000000005490000-memory.dmp family_babadeda -
OutSteel batch script 1 IoCs
Detects batch script dropped by OutSteel
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\r.bat outsteel_batch_script -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AudioManagementConsole.exedescription ioc process File opened (read-only) \??\m: AudioManagementConsole.exe File opened (read-only) \??\n: AudioManagementConsole.exe File opened (read-only) \??\v: AudioManagementConsole.exe File opened (read-only) \??\z: AudioManagementConsole.exe File opened (read-only) \??\i: AudioManagementConsole.exe File opened (read-only) \??\k: AudioManagementConsole.exe File opened (read-only) \??\p: AudioManagementConsole.exe File opened (read-only) \??\x: AudioManagementConsole.exe File opened (read-only) \??\b: AudioManagementConsole.exe File opened (read-only) \??\l: AudioManagementConsole.exe File opened (read-only) \??\q: AudioManagementConsole.exe File opened (read-only) \??\s: AudioManagementConsole.exe File opened (read-only) \??\t: AudioManagementConsole.exe File opened (read-only) \??\a: AudioManagementConsole.exe File opened (read-only) \??\e: AudioManagementConsole.exe File opened (read-only) \??\j: AudioManagementConsole.exe File opened (read-only) \??\o: AudioManagementConsole.exe File opened (read-only) \??\r: AudioManagementConsole.exe File opened (read-only) \??\u: AudioManagementConsole.exe File opened (read-only) \??\w: AudioManagementConsole.exe File opened (read-only) \??\y: AudioManagementConsole.exe File opened (read-only) \??\g: AudioManagementConsole.exe File opened (read-only) \??\h: AudioManagementConsole.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral4/memory/5092-1-0x0000000000E50000-0x0000000001147000-memory.dmp autoit_exe behavioral4/memory/5092-6-0x0000000000E50000-0x0000000001147000-memory.dmp autoit_exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4400 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4400 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AudioManagementConsole.exedescription pid process target process PID 5092 wrote to memory of 4728 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4728 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4728 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4124 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4124 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4124 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 2964 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 2964 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 2964 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 928 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 928 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 928 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4112 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4112 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4112 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1336 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1336 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1336 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3808 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3808 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3808 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1132 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1132 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1132 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4672 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4672 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4672 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1920 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1920 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1920 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3524 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3524 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3524 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3656 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3656 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3656 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 312 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 312 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 312 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1848 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1848 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1848 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1812 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1812 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1812 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3360 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3360 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3360 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1984 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1984 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1984 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4372 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4372 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4372 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1576 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1576 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 1576 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4280 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4280 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4280 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4604 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4604 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 4604 5092 AudioManagementConsole.exe cmd.exe PID 5092 wrote to memory of 3284 5092 AudioManagementConsole.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:2964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:3808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:1132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:1920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:3656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:1848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A2⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A2⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A2⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A2⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A2⤵PID:3284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A2⤵PID:1228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A2⤵PID:2124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A2⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A2⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A2⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A2⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A2⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A2⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A2⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A2⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A2⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A2⤵PID:1816
-
C:\Windows\SysWOW64\cmd.execmd /c start /min r.bat2⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K r.bat3⤵PID:3828
-
C:\Windows\SysWOW64\cmd.execmd /min /c del "C:\Users\Admin\AppData\Local\Temp\r.bat"4⤵PID:4800
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /IM cmd.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD5f6a86f75a098305a18cafbe90984fdb8
SHA10b2b5145b221487c975fb8a37894539f8af096b0
SHA256a28ad4e445a5069bb621efc516147c60248369f5fc100ee935974a9b556fb273
SHA512bee4c243f3a60f1778c5051d0a023afde678979a5da8db23f8811654afe468a06af6181c8338fc02d755dc223c52c653baa7abab8e941aac4cf335b7fabaac47