Analysis
-
max time kernel
159s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 11:48
Behavioral task
behavioral1
Sample
700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe
Resource
win7-20240221-en
General
-
Target
700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe
-
Size
16.5MB
-
MD5
e3ffe9b1db336ca7f34e0f26215d4ee4
-
SHA1
3ec434df80529311342401ac7a7acd066e19c90f
-
SHA256
700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901
-
SHA512
71168c55f1c159d48b11f951fae2c8686fc66e4e1ba57f5bc2904cc06af71d096ebc60220745133c83c5a06682621736c6f73261658af5ab086b5831f91c9a8b
-
SSDEEP
196608:jtxgKFeSqv70qJ3uf0jox2m1eKFL3mKLzmi3S4s8EzR:rgKHpqJ3ussx2R+L3mKnPSXV
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000014116-894.dat family_babadeda -
Executes dropped EXE 1 IoCs
Processes:
csvhelper.exepid Process 1172 csvhelper.exe -
Loads dropped DLL 2 IoCs
Processes:
700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.execsvhelper.exepid Process 2148 700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe 1172 csvhelper.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
csvhelper.exedescription ioc Process File opened (read-only) \??\e: csvhelper.exe File opened (read-only) \??\j: csvhelper.exe File opened (read-only) \??\k: csvhelper.exe File opened (read-only) \??\m: csvhelper.exe File opened (read-only) \??\x: csvhelper.exe File opened (read-only) \??\u: csvhelper.exe File opened (read-only) \??\y: csvhelper.exe File opened (read-only) \??\h: csvhelper.exe File opened (read-only) \??\l: csvhelper.exe File opened (read-only) \??\n: csvhelper.exe File opened (read-only) \??\q: csvhelper.exe File opened (read-only) \??\r: csvhelper.exe File opened (read-only) \??\s: csvhelper.exe File opened (read-only) \??\z: csvhelper.exe File opened (read-only) \??\a: csvhelper.exe File opened (read-only) \??\b: csvhelper.exe File opened (read-only) \??\g: csvhelper.exe File opened (read-only) \??\i: csvhelper.exe File opened (read-only) \??\o: csvhelper.exe File opened (read-only) \??\p: csvhelper.exe File opened (read-only) \??\t: csvhelper.exe File opened (read-only) \??\v: csvhelper.exe File opened (read-only) \??\w: csvhelper.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1172-896-0x00000000011A0000-0x00000000018DF000-memory.dmp autoit_exe behavioral1/memory/1172-898-0x00000000011A0000-0x00000000018DF000-memory.dmp autoit_exe behavioral1/memory/1172-900-0x00000000011A0000-0x00000000018DF000-memory.dmp autoit_exe behavioral1/memory/1172-902-0x00000000011A0000-0x00000000018DF000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.execsvhelper.exedescription pid Process procid_target PID 2148 wrote to memory of 1172 2148 700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe 27 PID 2148 wrote to memory of 1172 2148 700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe 27 PID 2148 wrote to memory of 1172 2148 700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe 27 PID 2148 wrote to memory of 1172 2148 700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe 27 PID 1172 wrote to memory of 2284 1172 csvhelper.exe 31 PID 1172 wrote to memory of 2284 1172 csvhelper.exe 31 PID 1172 wrote to memory of 2284 1172 csvhelper.exe 31 PID 1172 wrote to memory of 2284 1172 csvhelper.exe 31 PID 1172 wrote to memory of 1492 1172 csvhelper.exe 33 PID 1172 wrote to memory of 1492 1172 csvhelper.exe 33 PID 1172 wrote to memory of 1492 1172 csvhelper.exe 33 PID 1172 wrote to memory of 1492 1172 csvhelper.exe 33 PID 1172 wrote to memory of 3040 1172 csvhelper.exe 35 PID 1172 wrote to memory of 3040 1172 csvhelper.exe 35 PID 1172 wrote to memory of 3040 1172 csvhelper.exe 35 PID 1172 wrote to memory of 3040 1172 csvhelper.exe 35 PID 1172 wrote to memory of 2232 1172 csvhelper.exe 37 PID 1172 wrote to memory of 2232 1172 csvhelper.exe 37 PID 1172 wrote to memory of 2232 1172 csvhelper.exe 37 PID 1172 wrote to memory of 2232 1172 csvhelper.exe 37 PID 1172 wrote to memory of 2328 1172 csvhelper.exe 39 PID 1172 wrote to memory of 2328 1172 csvhelper.exe 39 PID 1172 wrote to memory of 2328 1172 csvhelper.exe 39 PID 1172 wrote to memory of 2328 1172 csvhelper.exe 39 PID 1172 wrote to memory of 1552 1172 csvhelper.exe 41 PID 1172 wrote to memory of 1552 1172 csvhelper.exe 41 PID 1172 wrote to memory of 1552 1172 csvhelper.exe 41 PID 1172 wrote to memory of 1552 1172 csvhelper.exe 41 PID 1172 wrote to memory of 1536 1172 csvhelper.exe 43 PID 1172 wrote to memory of 1536 1172 csvhelper.exe 43 PID 1172 wrote to memory of 1536 1172 csvhelper.exe 43 PID 1172 wrote to memory of 1536 1172 csvhelper.exe 43 PID 1172 wrote to memory of 3028 1172 csvhelper.exe 45 PID 1172 wrote to memory of 3028 1172 csvhelper.exe 45 PID 1172 wrote to memory of 3028 1172 csvhelper.exe 45 PID 1172 wrote to memory of 3028 1172 csvhelper.exe 45 PID 1172 wrote to memory of 2020 1172 csvhelper.exe 47 PID 1172 wrote to memory of 2020 1172 csvhelper.exe 47 PID 1172 wrote to memory of 2020 1172 csvhelper.exe 47 PID 1172 wrote to memory of 2020 1172 csvhelper.exe 47 PID 1172 wrote to memory of 2008 1172 csvhelper.exe 49 PID 1172 wrote to memory of 2008 1172 csvhelper.exe 49 PID 1172 wrote to memory of 2008 1172 csvhelper.exe 49 PID 1172 wrote to memory of 2008 1172 csvhelper.exe 49 PID 1172 wrote to memory of 2188 1172 csvhelper.exe 51 PID 1172 wrote to memory of 2188 1172 csvhelper.exe 51 PID 1172 wrote to memory of 2188 1172 csvhelper.exe 51 PID 1172 wrote to memory of 2188 1172 csvhelper.exe 51 PID 1172 wrote to memory of 2312 1172 csvhelper.exe 53 PID 1172 wrote to memory of 2312 1172 csvhelper.exe 53 PID 1172 wrote to memory of 2312 1172 csvhelper.exe 53 PID 1172 wrote to memory of 2312 1172 csvhelper.exe 53 PID 1172 wrote to memory of 1368 1172 csvhelper.exe 55 PID 1172 wrote to memory of 1368 1172 csvhelper.exe 55 PID 1172 wrote to memory of 1368 1172 csvhelper.exe 55 PID 1172 wrote to memory of 1368 1172 csvhelper.exe 55 PID 1172 wrote to memory of 556 1172 csvhelper.exe 57 PID 1172 wrote to memory of 556 1172 csvhelper.exe 57 PID 1172 wrote to memory of 556 1172 csvhelper.exe 57 PID 1172 wrote to memory of 556 1172 csvhelper.exe 57 PID 1172 wrote to memory of 2064 1172 csvhelper.exe 59 PID 1172 wrote to memory of 2064 1172 csvhelper.exe 59 PID 1172 wrote to memory of 2064 1172 csvhelper.exe 59 PID 1172 wrote to memory of 2064 1172 csvhelper.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe"C:\Users\Admin\AppData\Local\Temp\700b05fede8afe3573b6fec81452d4b09c29adb003cdacb762c8b53d84709901.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\Josh Close\CsvHelper\csvhelper.exe"C:\Users\Admin\AppData\Roaming\Josh Close\CsvHelper\csvhelper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:2284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:1492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:3040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:2328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:1552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:2188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:2064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:2468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A3⤵PID:1940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5349a1d8bb00ae11bbf535cd909838c65
SHA1c7b9d73580d6c733fbd5875bbccfbf3b792018e2
SHA25693e4d8628b80b495625844695be857f62353c5b95a1ed85f262fb8681a2cbae4
SHA512f1911c2071628fcbf4d18640d50808d2c23c22594c71e380d3f8cb6d90ae3c75019c4210ff6f6f54a918ec346694bdf821757cc4f174ed48a7a11d28a4aced51
-
C:\Users\Admin\AppData\Roaming\Josh Close\CsvHelper\Images\[email protected]
Filesize2KB
MD544018e1779270b083ad90da3dffe9b15
SHA1e09c06b564abe26bcf91ecb7632d761c3234b30d
SHA25671bacaee2c9e1fbe6a7184aaf9d3f8e24d6390ca62298c5da425bf060cd2bc4c
SHA512ece1fde07753a160735d2c09272410a473c7cbf18972005baa36480d363e87a47f02b7b83efb893b88e334e7f49d645d85f802246e7508623d20c04adb6cbb7b
-
C:\Users\Admin\AppData\Roaming\Josh Close\CsvHelper\Images\[email protected]
Filesize4KB
MD5b3c74bb5250effad46ce11a96c9468c2
SHA13a339e244a29fe41d13fa4cc951a7e0a2862e299
SHA2565a9479caa4024731d61172652a67021f4973a03548516d36a4865ec161a57825
SHA512a5f8499a39972341740f46f96f90feb6cab15610fd9e7d25eeae139236fe115874806a6554c8fe180dee097088f8d4802a20b0ebc7de0c04486c7dbce36116c3
-
C:\Users\Admin\AppData\Roaming\Josh Close\CsvHelper\Images\[email protected]
Filesize4KB
MD53272be2da53b6d5271111431f7d90d28
SHA17ec382eee6282454d5b0b03751f3d14c568bbfa5
SHA2564e2a12a194e0db12de874ad8c9a5288b5a56285b426883bd0e3cef1866569982
SHA51245dbfa8dd5aa0bd1e2dd042a716f00bad44142b98bcffedb7c30403b6132b50e72db64909d3873ca3a154d4a2e90433093c4f040454bca005b8274130c827b26
-
C:\Users\Admin\AppData\Roaming\Josh Close\CsvHelper\Images\[email protected]
Filesize2KB
MD5228d4bd899577ed16ad3ac74b592a0e6
SHA1baf99e34e126d6c41b7aa39caabc2376358bab70
SHA256fe87e02e797a143042bd7f10fa57c6e2a53028b5d5ab4c3da2a1e4affd1c86d5
SHA512285b2057d2bce4086859d76ad7c57f029946106e5bf31525a92450714b790bc77fb982e6e1edfedfbb4335a791911e057caf01ea801868ae196a8775a78adebc
-
C:\Users\Admin\AppData\Roaming\Josh Close\CsvHelper\Images\[email protected]
Filesize2KB
MD52719683b8dba819f2e6bd9e9b7307f1c
SHA16cbac17ebf8b56489ad8b8c458dd618b2788512a
SHA256316b67841dba6c73097d0d50d1b454fd80b6aac86fa0fe15f9b514d65a5bb66a
SHA51296ffe07ea87dae0bcf92a2d06dbfc8604526e77afd8f1bae1bc3ef17261463a214a54d91e7f672a5b8455ed4c7bba8fbe19e12255c6d5b2bbd26dda5c8b6ccee
-
Filesize
6.9MB
MD5f5de326683df44d71ed1b986fd836e0b
SHA133bc899da6afd2b82b27d59acd0844b521e57079
SHA25617c3cf5742d2a0995afb4dd2a2d711abe5de346abde49cf4cf5b82c14e0a155f
SHA51212ae60cec6bd90c6bf4f8bb5196f79811bc03f4208c9c1148190551854a04f3b61732d3cb7f99feea019cc1f5c05c37b5ad24e24de39763acfc663b31434f15a
-
Filesize
3.9MB
MD51bf457ea201a3374f7c37f43d5c3ffdb
SHA1bf693ad6b3070cfb60902eeeb3a290bad531bbd0
SHA2569107ca00ea91640e2498b2d7c1529d7eaaa731907bb9a3732a6895fbca9aaf08
SHA512c6657ffbcefb3e5ae704fb4712520b3ff705c23a206628b3f348cb11fa0e55e5c2ac54172d98a79470c15413e7f526fbc12ac700c7ae83052f888c241d530074