Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe
Resource
win7-20240221-en
General
-
Target
fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe
-
Size
8.2MB
-
MD5
bafdcdfdac4e0d5a835c1048af2a3815
-
SHA1
8ed85a4739ab5945ee21e05947eb204ef04bcc02
-
SHA256
fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3
-
SHA512
cebd84cc2763126fb041bfb2bde31447c3bc09af08bbd6087bbc7640d7a64a5edc158916db639f590e74439eb7b9e057bf70b98d74aff8f27c2c2ffc7e69a743
-
SSDEEP
196608:oPGZKb8E61MymPXM+MnOLEntvs+qfR4NQU/qsnZuv7:Jo61Vq6nOgteYQU/1uj
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x000400000001cf7e-962.dat family_babadeda -
Executes dropped EXE 2 IoCs
pid Process 2968 irsetup.exe 864 csvhelper.exe -
Loads dropped DLL 14 IoCs
pid Process 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 2968 irsetup.exe 2968 irsetup.exe 2968 irsetup.exe 2968 irsetup.exe 2968 irsetup.exe 2968 irsetup.exe 2968 irsetup.exe 2968 irsetup.exe 2968 irsetup.exe 864 csvhelper.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000c000000015653-3.dat upx behavioral1/memory/2876-14-0x00000000031C0000-0x00000000035A8000-memory.dmp upx behavioral1/memory/2968-19-0x0000000000120000-0x0000000000508000-memory.dmp upx behavioral1/memory/2968-957-0x0000000000120000-0x0000000000508000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: csvhelper.exe File opened (read-only) \??\g: csvhelper.exe File opened (read-only) \??\o: csvhelper.exe File opened (read-only) \??\q: csvhelper.exe File opened (read-only) \??\s: csvhelper.exe File opened (read-only) \??\v: csvhelper.exe File opened (read-only) \??\i: csvhelper.exe File opened (read-only) \??\j: csvhelper.exe File opened (read-only) \??\m: csvhelper.exe File opened (read-only) \??\n: csvhelper.exe File opened (read-only) \??\t: csvhelper.exe File opened (read-only) \??\u: csvhelper.exe File opened (read-only) \??\h: csvhelper.exe File opened (read-only) \??\k: csvhelper.exe File opened (read-only) \??\l: csvhelper.exe File opened (read-only) \??\p: csvhelper.exe File opened (read-only) \??\r: csvhelper.exe File opened (read-only) \??\w: csvhelper.exe File opened (read-only) \??\x: csvhelper.exe File opened (read-only) \??\z: csvhelper.exe File opened (read-only) \??\b: csvhelper.exe File opened (read-only) \??\e: csvhelper.exe File opened (read-only) \??\y: csvhelper.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/864-964-0x00000000009E0000-0x000000000111F000-memory.dmp autoit_exe behavioral1/memory/864-966-0x00000000009E0000-0x000000000111F000-memory.dmp autoit_exe behavioral1/memory/864-968-0x00000000009E0000-0x000000000111F000-memory.dmp autoit_exe behavioral1/memory/864-970-0x00000000009E0000-0x000000000111F000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 irsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\CsvHelper\\7-zip.dll" irsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" irsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} irsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" irsetup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2968 irsetup.exe 2968 irsetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2968 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 28 PID 2876 wrote to memory of 2968 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 28 PID 2876 wrote to memory of 2968 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 28 PID 2876 wrote to memory of 2968 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 28 PID 2876 wrote to memory of 2968 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 28 PID 2876 wrote to memory of 2968 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 28 PID 2876 wrote to memory of 2968 2876 fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe 28 PID 2968 wrote to memory of 864 2968 irsetup.exe 29 PID 2968 wrote to memory of 864 2968 irsetup.exe 29 PID 2968 wrote to memory of 864 2968 irsetup.exe 29 PID 2968 wrote to memory of 864 2968 irsetup.exe 29 PID 864 wrote to memory of 1568 864 csvhelper.exe 32 PID 864 wrote to memory of 1568 864 csvhelper.exe 32 PID 864 wrote to memory of 1568 864 csvhelper.exe 32 PID 864 wrote to memory of 1568 864 csvhelper.exe 32 PID 864 wrote to memory of 1044 864 csvhelper.exe 34 PID 864 wrote to memory of 1044 864 csvhelper.exe 34 PID 864 wrote to memory of 1044 864 csvhelper.exe 34 PID 864 wrote to memory of 1044 864 csvhelper.exe 34 PID 864 wrote to memory of 936 864 csvhelper.exe 36 PID 864 wrote to memory of 936 864 csvhelper.exe 36 PID 864 wrote to memory of 936 864 csvhelper.exe 36 PID 864 wrote to memory of 936 864 csvhelper.exe 36 PID 864 wrote to memory of 344 864 csvhelper.exe 38 PID 864 wrote to memory of 344 864 csvhelper.exe 38 PID 864 wrote to memory of 344 864 csvhelper.exe 38 PID 864 wrote to memory of 344 864 csvhelper.exe 38 PID 864 wrote to memory of 320 864 csvhelper.exe 40 PID 864 wrote to memory of 320 864 csvhelper.exe 40 PID 864 wrote to memory of 320 864 csvhelper.exe 40 PID 864 wrote to memory of 320 864 csvhelper.exe 40 PID 864 wrote to memory of 1088 864 csvhelper.exe 42 PID 864 wrote to memory of 1088 864 csvhelper.exe 42 PID 864 wrote to memory of 1088 864 csvhelper.exe 42 PID 864 wrote to memory of 1088 864 csvhelper.exe 42 PID 864 wrote to memory of 2528 864 csvhelper.exe 44 PID 864 wrote to memory of 2528 864 csvhelper.exe 44 PID 864 wrote to memory of 2528 864 csvhelper.exe 44 PID 864 wrote to memory of 2528 864 csvhelper.exe 44 PID 864 wrote to memory of 560 864 csvhelper.exe 46 PID 864 wrote to memory of 560 864 csvhelper.exe 46 PID 864 wrote to memory of 560 864 csvhelper.exe 46 PID 864 wrote to memory of 560 864 csvhelper.exe 46 PID 864 wrote to memory of 3004 864 csvhelper.exe 48 PID 864 wrote to memory of 3004 864 csvhelper.exe 48 PID 864 wrote to memory of 3004 864 csvhelper.exe 48 PID 864 wrote to memory of 3004 864 csvhelper.exe 48 PID 864 wrote to memory of 2184 864 csvhelper.exe 50 PID 864 wrote to memory of 2184 864 csvhelper.exe 50 PID 864 wrote to memory of 2184 864 csvhelper.exe 50 PID 864 wrote to memory of 2184 864 csvhelper.exe 50 PID 864 wrote to memory of 2244 864 csvhelper.exe 52 PID 864 wrote to memory of 2244 864 csvhelper.exe 52 PID 864 wrote to memory of 2244 864 csvhelper.exe 52 PID 864 wrote to memory of 2244 864 csvhelper.exe 52 PID 864 wrote to memory of 1608 864 csvhelper.exe 54 PID 864 wrote to memory of 1608 864 csvhelper.exe 54 PID 864 wrote to memory of 1608 864 csvhelper.exe 54 PID 864 wrote to memory of 1608 864 csvhelper.exe 54 PID 864 wrote to memory of 1728 864 csvhelper.exe 56 PID 864 wrote to memory of 1728 864 csvhelper.exe 56 PID 864 wrote to memory of 1728 864 csvhelper.exe 56 PID 864 wrote to memory of 1728 864 csvhelper.exe 56 PID 864 wrote to memory of 2964 864 csvhelper.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe"C:\Users\Admin\AppData\Local\Temp\fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1798690 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe" "__IRCT:1" "__IRTSS:0" "__IRSID:S-1-5-21-3452737119-3959686427-228443150-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\CsvHelper\csvhelper.exe"C:\Users\Admin\AppData\Roaming\CsvHelper\csvhelper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A4⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A4⤵PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A4⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A4⤵PID:344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A4⤵PID:320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A4⤵PID:1088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A4⤵PID:2528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A4⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A4⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A4⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A4⤵PID:2244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A4⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A4⤵PID:1728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A4⤵PID:2964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A4⤵PID:2148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A4⤵PID:2812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A4⤵PID:2736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A4⤵PID:2784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD5e7a789232ef503dcb4929791673009a3
SHA18bc28bce4c9d8b4a6e360100441ba54a878de4c1
SHA25689daa79b558055f6f893abf38a0f17d3e1e0193d59dafbdf98d72d4e5961c2a1
SHA5126439a2ec5e9d486c15a37a736bc8d36d8e5f6ecb6a354d0fdd7efc9dccd3fb6bdb208a051b0d81f101669169826e07f9b4ddd79259c79c1e03856af5a9442b87
-
Filesize
2.0MB
MD5349a1d8bb00ae11bbf535cd909838c65
SHA1c7b9d73580d6c733fbd5875bbccfbf3b792018e2
SHA25693e4d8628b80b495625844695be857f62353c5b95a1ed85f262fb8681a2cbae4
SHA512f1911c2071628fcbf4d18640d50808d2c23c22594c71e380d3f8cb6d90ae3c75019c4210ff6f6f54a918ec346694bdf821757cc4f174ed48a7a11d28a4aced51
-
C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]
Filesize2KB
MD544018e1779270b083ad90da3dffe9b15
SHA1e09c06b564abe26bcf91ecb7632d761c3234b30d
SHA25671bacaee2c9e1fbe6a7184aaf9d3f8e24d6390ca62298c5da425bf060cd2bc4c
SHA512ece1fde07753a160735d2c09272410a473c7cbf18972005baa36480d363e87a47f02b7b83efb893b88e334e7f49d645d85f802246e7508623d20c04adb6cbb7b
-
C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]
Filesize4KB
MD5b3c74bb5250effad46ce11a96c9468c2
SHA13a339e244a29fe41d13fa4cc951a7e0a2862e299
SHA2565a9479caa4024731d61172652a67021f4973a03548516d36a4865ec161a57825
SHA512a5f8499a39972341740f46f96f90feb6cab15610fd9e7d25eeae139236fe115874806a6554c8fe180dee097088f8d4802a20b0ebc7de0c04486c7dbce36116c3
-
C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]
Filesize4KB
MD53272be2da53b6d5271111431f7d90d28
SHA17ec382eee6282454d5b0b03751f3d14c568bbfa5
SHA2564e2a12a194e0db12de874ad8c9a5288b5a56285b426883bd0e3cef1866569982
SHA51245dbfa8dd5aa0bd1e2dd042a716f00bad44142b98bcffedb7c30403b6132b50e72db64909d3873ca3a154d4a2e90433093c4f040454bca005b8274130c827b26
-
C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]
Filesize2KB
MD5228d4bd899577ed16ad3ac74b592a0e6
SHA1baf99e34e126d6c41b7aa39caabc2376358bab70
SHA256fe87e02e797a143042bd7f10fa57c6e2a53028b5d5ab4c3da2a1e4affd1c86d5
SHA512285b2057d2bce4086859d76ad7c57f029946106e5bf31525a92450714b790bc77fb982e6e1edfedfbb4335a791911e057caf01ea801868ae196a8775a78adebc
-
C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]
Filesize2KB
MD52719683b8dba819f2e6bd9e9b7307f1c
SHA16cbac17ebf8b56489ad8b8c458dd618b2788512a
SHA256316b67841dba6c73097d0d50d1b454fd80b6aac86fa0fe15f9b514d65a5bb66a
SHA51296ffe07ea87dae0bcf92a2d06dbfc8604526e77afd8f1bae1bc3ef17261463a214a54d91e7f672a5b8455ed4c7bba8fbe19e12255c6d5b2bbd26dda5c8b6ccee
-
Filesize
71KB
MD525ff929da5c3723895a26e22045336f0
SHA1ad9867b6eb3b092dc870ed02dfc9bd6db4e6e194
SHA25616d4d5175cc233d7d18321a74b87ab14a80a7e9173e0b55e4810793cce7da4f9
SHA512cf65fd9dbbfb964e828cd7f962bc2d9fd8e1c7316b20b81fc9bc0ab12e02e1a3403d455f80990eb53ff4f2191a618abfab6c5a586e535f4bfbd7d9d0abbfb352
-
Filesize
77KB
MD5b93816edf32e4ff83b703379e66c5a36
SHA1c3eaba74bc9f7a4e8a17890fd119eb3ce7107d0d
SHA256913adab269547de77b7b9792ab7a81af5029c9f391c58e33dccaa18b4abe11bb
SHA512fda4e1cca70c2b82050f5ab4989ece93d14a5bce3ce9dd12c3e75955654486e62e7b3cfeb2aedfe15fd458e54690644f8224b6171bfce6c6ccc8de6f341090ba
-
Filesize
6.9MB
MD5f5de326683df44d71ed1b986fd836e0b
SHA133bc899da6afd2b82b27d59acd0844b521e57079
SHA25617c3cf5742d2a0995afb4dd2a2d711abe5de346abde49cf4cf5b82c14e0a155f
SHA51212ae60cec6bd90c6bf4f8bb5196f79811bc03f4208c9c1148190551854a04f3b61732d3cb7f99feea019cc1f5c05c37b5ad24e24de39763acfc663b31434f15a
-
Filesize
3.9MB
MD51bf457ea201a3374f7c37f43d5c3ffdb
SHA1bf693ad6b3070cfb60902eeeb3a290bad531bbd0
SHA2569107ca00ea91640e2498b2d7c1529d7eaaa731907bb9a3732a6895fbca9aaf08
SHA512c6657ffbcefb3e5ae704fb4712520b3ff705c23a206628b3f348cb11fa0e55e5c2ac54172d98a79470c15413e7f526fbc12ac700c7ae83052f888c241d530074
-
Filesize
1.3MB
MD5ac23d03c4b8d531016a3c1ebfa2bc91c
SHA111383627d5515ed2257f594db7fbce3a4b9106f8
SHA2560ddd10f3c8a3268237117f08a94c52ead801a76286bb76d0f521b56689801d06
SHA512bb649ab787a05dba410ce43a592b7f122c71f1fdc69bbb8789c57a3e64018189eebb9b46669a2d6a1b156818bb59beed130aeae6e1928108dee16168445659c1
-
Filesize
48KB
MD523c651b2ace76d42fec3989bcba3ce7b
SHA1378776d20133f20a4c42476bdcb0a408ef1dce1c
SHA2561b8410f839283a9483369dacdb22290b065ece6f00c026d953024666761532e2
SHA512e47ae720b9ee4388dacfdbf2ba1e2dc546cc01fdb25a6c82ceeeda03801e449f660e97b3bbb6f65b791bfc1566f21187053472022c6c7c0d68f8cf1187326ec8