Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 20:26

General

  • Target

    be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7.exe

  • Size

    399KB

  • MD5

    4370a4f6b3743b078828208bc9b4c858

  • SHA1

    c626f8a27836e88b6ef96fe5430fa4b3ce3d0a40

  • SHA256

    be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7

  • SHA512

    9e24f9a0f4c287c6450af6e803cb1e70a7ddc8026a37648ad817fff26ca2f2e49b5ab34a2b280734ff8eaea85e3fdac015a69b4feaa2d8da33bc9af7db2d344f

  • SSDEEP

    6144:bjluQoSsqaxIo5R4nM/pE+lHZoVHQ8TZWm6g4ziLxqJyj4BkKBG8Q++jXhHGF/KY:bEQoSx0qYG14g2QqJe4BkKBJEY/svTk

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7.exe
    "C:\Users\Admin\AppData\Local\Temp\be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7.exe
      "C:\Users\Admin\AppData\Local\Temp\be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Users\Admin\AppData\Local\Temp\be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7.exe
        "C:\Users\Admin\AppData\Local\Temp\be57f12d66f6abfa0c71c5ea3ca0517e6103ab4e9f35ea0df07fb0980d9c6ad7.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\bukkake [free] shoes .avi.exe

    Filesize

    425KB

    MD5

    a591a90da54f412faaa836ffa7347ee2

    SHA1

    d264d6fbd3177ae02e294ec83fe9732e6a73e43d

    SHA256

    132636e32426c6ca8de371c22a563d5bcadd50b3d818ea3f4711e96a338eaa9b

    SHA512

    b783c8730690e8e0f28a22b1ebcb37848ff0fbf1c6d5fdd43527492f2767697eb7ca5d03a11851491a03927a84ec2473e8a82c8727c74a8cc872ef0832381dc5

  • C:\debug.txt

    Filesize

    183B

    MD5

    ff3361d6c43f587d969df393b77e8eb0

    SHA1

    a3579c79bf97b1912974a3969214b66b15cce18d

    SHA256

    0cf1649c1466e166f27c6591304283c01f2e1889cc3c678acf8d6aff14b3d998

    SHA512

    d81d41728575c23cc1ba862db9bb61d5b5455e6eb41d29590bb0de1a350d71e5ac9159f4241cfe2c1dcadac58f668ed7f308c1e5bde4b4a9ea6a9b96bf2fbede

  • memory/2064-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2064-76-0x0000000004900000-0x0000000004929000-memory.dmp

    Filesize

    164KB

  • memory/2476-77-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2476-86-0x00000000007D0000-0x00000000007F9000-memory.dmp

    Filesize

    164KB

  • memory/2892-87-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB