Analysis

  • max time kernel
    142s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 15:04

General

  • Target

    fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe

  • Size

    8.2MB

  • MD5

    bafdcdfdac4e0d5a835c1048af2a3815

  • SHA1

    8ed85a4739ab5945ee21e05947eb204ef04bcc02

  • SHA256

    fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3

  • SHA512

    cebd84cc2763126fb041bfb2bde31447c3bc09af08bbd6087bbc7640d7a64a5edc158916db639f590e74439eb7b9e057bf70b98d74aff8f27c2c2ffc7e69a743

  • SSDEEP

    196608:oPGZKb8E61MymPXM+MnOLEntvs+qfR4NQU/qsnZuv7:Jo61Vq6nOgteYQU/1uj

Malware Config

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 1 IoCs
  • OutSteel

    OutSteel is a file uploader and document stealer written in AutoIT.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe
    "C:\Users\Admin\AppData\Local\Temp\fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1798690 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\fad2e8293cf38eec695b1b5c012e187999bd94fbcad91d8f110605a9709c31b3.exe" "__IRCT:1" "__IRTSS:0" "__IRSID:S-1-5-21-3452737119-3959686427-228443150-1000"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Roaming\CsvHelper\csvhelper.exe
        "C:\Users\Admin\AppData\Roaming\CsvHelper\csvhelper.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A
          4⤵
            PID:1568
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A
            4⤵
              PID:1044
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A
              4⤵
                PID:936
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
                4⤵
                  PID:344
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A
                  4⤵
                    PID:320
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A
                    4⤵
                      PID:1088
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A
                      4⤵
                        PID:2528
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
                        4⤵
                          PID:560
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A
                          4⤵
                            PID:3004
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A
                            4⤵
                              PID:2184
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A
                              4⤵
                                PID:2244
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A
                                4⤵
                                  PID:1608
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A
                                  4⤵
                                    PID:1728
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A
                                    4⤵
                                      PID:2964
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A
                                      4⤵
                                        PID:2148
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A
                                        4⤵
                                          PID:2812
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A
                                          4⤵
                                            PID:2736
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A
                                            4⤵
                                              PID:2784

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

                                        Filesize

                                        326KB

                                        MD5

                                        e7a789232ef503dcb4929791673009a3

                                        SHA1

                                        8bc28bce4c9d8b4a6e360100441ba54a878de4c1

                                        SHA256

                                        89daa79b558055f6f893abf38a0f17d3e1e0193d59dafbdf98d72d4e5961c2a1

                                        SHA512

                                        6439a2ec5e9d486c15a37a736bc8d36d8e5f6ecb6a354d0fdd7efc9dccd3fb6bdb208a051b0d81f101669169826e07f9b4ddd79259c79c1e03856af5a9442b87

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Guide.pdf

                                        Filesize

                                        2.0MB

                                        MD5

                                        349a1d8bb00ae11bbf535cd909838c65

                                        SHA1

                                        c7b9d73580d6c733fbd5875bbccfbf3b792018e2

                                        SHA256

                                        93e4d8628b80b495625844695be857f62353c5b95a1ed85f262fb8681a2cbae4

                                        SHA512

                                        f1911c2071628fcbf4d18640d50808d2c23c22594c71e380d3f8cb6d90ae3c75019c4210ff6f6f54a918ec346694bdf821757cc4f174ed48a7a11d28a4aced51

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]

                                        Filesize

                                        2KB

                                        MD5

                                        44018e1779270b083ad90da3dffe9b15

                                        SHA1

                                        e09c06b564abe26bcf91ecb7632d761c3234b30d

                                        SHA256

                                        71bacaee2c9e1fbe6a7184aaf9d3f8e24d6390ca62298c5da425bf060cd2bc4c

                                        SHA512

                                        ece1fde07753a160735d2c09272410a473c7cbf18972005baa36480d363e87a47f02b7b83efb893b88e334e7f49d645d85f802246e7508623d20c04adb6cbb7b

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]

                                        Filesize

                                        4KB

                                        MD5

                                        b3c74bb5250effad46ce11a96c9468c2

                                        SHA1

                                        3a339e244a29fe41d13fa4cc951a7e0a2862e299

                                        SHA256

                                        5a9479caa4024731d61172652a67021f4973a03548516d36a4865ec161a57825

                                        SHA512

                                        a5f8499a39972341740f46f96f90feb6cab15610fd9e7d25eeae139236fe115874806a6554c8fe180dee097088f8d4802a20b0ebc7de0c04486c7dbce36116c3

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]

                                        Filesize

                                        4KB

                                        MD5

                                        3272be2da53b6d5271111431f7d90d28

                                        SHA1

                                        7ec382eee6282454d5b0b03751f3d14c568bbfa5

                                        SHA256

                                        4e2a12a194e0db12de874ad8c9a5288b5a56285b426883bd0e3cef1866569982

                                        SHA512

                                        45dbfa8dd5aa0bd1e2dd042a716f00bad44142b98bcffedb7c30403b6132b50e72db64909d3873ca3a154d4a2e90433093c4f040454bca005b8274130c827b26

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]

                                        Filesize

                                        2KB

                                        MD5

                                        228d4bd899577ed16ad3ac74b592a0e6

                                        SHA1

                                        baf99e34e126d6c41b7aa39caabc2376358bab70

                                        SHA256

                                        fe87e02e797a143042bd7f10fa57c6e2a53028b5d5ab4c3da2a1e4affd1c86d5

                                        SHA512

                                        285b2057d2bce4086859d76ad7c57f029946106e5bf31525a92450714b790bc77fb982e6e1edfedfbb4335a791911e057caf01ea801868ae196a8775a78adebc

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Images\[email protected]

                                        Filesize

                                        2KB

                                        MD5

                                        2719683b8dba819f2e6bd9e9b7307f1c

                                        SHA1

                                        6cbac17ebf8b56489ad8b8c458dd618b2788512a

                                        SHA256

                                        316b67841dba6c73097d0d50d1b454fd80b6aac86fa0fe15f9b514d65a5bb66a

                                        SHA512

                                        96ffe07ea87dae0bcf92a2d06dbfc8604526e77afd8f1bae1bc3ef17261463a214a54d91e7f672a5b8455ed4c7bba8fbe19e12255c6d5b2bbd26dda5c8b6ccee

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Uninstall\uninstall.xml

                                        Filesize

                                        71KB

                                        MD5

                                        25ff929da5c3723895a26e22045336f0

                                        SHA1

                                        ad9867b6eb3b092dc870ed02dfc9bd6db4e6e194

                                        SHA256

                                        16d4d5175cc233d7d18321a74b87ab14a80a7e9173e0b55e4810793cce7da4f9

                                        SHA512

                                        cf65fd9dbbfb964e828cd7f962bc2d9fd8e1c7316b20b81fc9bc0ab12e02e1a3403d455f80990eb53ff4f2191a618abfab6c5a586e535f4bfbd7d9d0abbfb352

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\Uninstall\uninstall.xml

                                        Filesize

                                        77KB

                                        MD5

                                        b93816edf32e4ff83b703379e66c5a36

                                        SHA1

                                        c3eaba74bc9f7a4e8a17890fd119eb3ce7107d0d

                                        SHA256

                                        913adab269547de77b7b9792ab7a81af5029c9f391c58e33dccaa18b4abe11bb

                                        SHA512

                                        fda4e1cca70c2b82050f5ab4989ece93d14a5bce3ce9dd12c3e75955654486e62e7b3cfeb2aedfe15fd458e54690644f8224b6171bfce6c6ccc8de6f341090ba

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\csvhelper.exe

                                        Filesize

                                        6.9MB

                                        MD5

                                        f5de326683df44d71ed1b986fd836e0b

                                        SHA1

                                        33bc899da6afd2b82b27d59acd0844b521e57079

                                        SHA256

                                        17c3cf5742d2a0995afb4dd2a2d711abe5de346abde49cf4cf5b82c14e0a155f

                                        SHA512

                                        12ae60cec6bd90c6bf4f8bb5196f79811bc03f4208c9c1148190551854a04f3b61732d3cb7f99feea019cc1f5c05c37b5ad24e24de39763acfc663b31434f15a

                                      • C:\Users\Admin\AppData\Roaming\CsvHelper\libfreetype-4.dll

                                        Filesize

                                        3.9MB

                                        MD5

                                        1bf457ea201a3374f7c37f43d5c3ffdb

                                        SHA1

                                        bf693ad6b3070cfb60902eeeb3a290bad531bbd0

                                        SHA256

                                        9107ca00ea91640e2498b2d7c1529d7eaaa731907bb9a3732a6895fbca9aaf08

                                        SHA512

                                        c6657ffbcefb3e5ae704fb4712520b3ff705c23a206628b3f348cb11fa0e55e5c2ac54172d98a79470c15413e7f526fbc12ac700c7ae83052f888c241d530074

                                      • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

                                        Filesize

                                        1.3MB

                                        MD5

                                        ac23d03c4b8d531016a3c1ebfa2bc91c

                                        SHA1

                                        11383627d5515ed2257f594db7fbce3a4b9106f8

                                        SHA256

                                        0ddd10f3c8a3268237117f08a94c52ead801a76286bb76d0f521b56689801d06

                                        SHA512

                                        bb649ab787a05dba410ce43a592b7f122c71f1fdc69bbb8789c57a3e64018189eebb9b46669a2d6a1b156818bb59beed130aeae6e1928108dee16168445659c1

                                      • \Users\Admin\AppData\Roaming\CsvHelper\7-zip.dll

                                        Filesize

                                        48KB

                                        MD5

                                        23c651b2ace76d42fec3989bcba3ce7b

                                        SHA1

                                        378776d20133f20a4c42476bdcb0a408ef1dce1c

                                        SHA256

                                        1b8410f839283a9483369dacdb22290b065ece6f00c026d953024666761532e2

                                        SHA512

                                        e47ae720b9ee4388dacfdbf2ba1e2dc546cc01fdb25a6c82ceeeda03801e449f660e97b3bbb6f65b791bfc1566f21187053472022c6c7c0d68f8cf1187326ec8

                                      • memory/864-970-0x00000000009E0000-0x000000000111F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/864-960-0x00000000009E0000-0x000000000111F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/864-968-0x00000000009E0000-0x000000000111F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/864-966-0x00000000009E0000-0x000000000111F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/864-964-0x00000000009E0000-0x000000000111F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/2876-15-0x00000000031C0000-0x00000000035A8000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/2876-16-0x00000000031C0000-0x00000000035A8000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/2876-17-0x00000000031C0000-0x00000000035A8000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/2876-14-0x00000000031C0000-0x00000000035A8000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/2968-950-0x0000000005240000-0x000000000597F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/2968-959-0x0000000005240000-0x000000000597F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/2968-951-0x0000000005240000-0x000000000597F000-memory.dmp

                                        Filesize

                                        7.2MB

                                      • memory/2968-957-0x0000000000120000-0x0000000000508000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/2968-19-0x0000000000120000-0x0000000000508000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/2968-938-0x0000000002280000-0x0000000002290000-memory.dmp

                                        Filesize

                                        64KB