Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 23:13

General

  • Target

    6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143.exe

  • Size

    654KB

  • MD5

    25efbc17a60e994c395985f89e4f41ff

  • SHA1

    49578abd7cbf3f462f8a91969dc25e6c6a87a91d

  • SHA256

    6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143

  • SHA512

    d0a8b93313ac8fe2d66219359323c802043a78caefba89fb25c1449ed5b1d460591ba010951944bb936a82b74047418b07ca400b93346297e0f5d930de7a2902

  • SSDEEP

    12288:lXa8slsIM3JhoITKyYBS3zTlTk7GoiQ7ONRhO57oTtCUD5NinT08pI6qEyov:lq8K4JQy++Nk73ZORhs7oTtCUGnT021l

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 19 IoCs
  • UPX dump on OEP (original entry point) 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143.exe
      "C:\Users\Admin\AppData\Local\Temp\6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Local\Temp\6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143.exe
        "C:\Users\Admin\AppData\Local\Temp\6c6954a315036c806669a9370b9468352cfe1ea763bfec27a9070467ab520143.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\black animal horse sleeping glans lady (Karin).avi.exe

    Filesize

    535KB

    MD5

    1736153109d5753264a3df05a621f71a

    SHA1

    dd342c72f9c0572e6720d1cea04c3dfb5945a84a

    SHA256

    81152bbb395d9114f30f2e1260f22c223cae702f24c0c5d0c4a8882fbf070144

    SHA512

    5dcd71f591496036ba922c10c27966656dfee758034a7fd89f8d115ba5f189598fcc255e76c4bc990d66e6d85380f1dcfab443f97648701e1be63458a80ffa68

  • C:\debug.txt

    Filesize

    183B

    MD5

    9ea8bbb049d3057be7ff4d8094044e71

    SHA1

    3772d134d65c8a5a49d2301d5902f1963fbe685c

    SHA256

    48b0664dff21b294f594ebdee3c190d8a2c69e49ba8cad564a3a1b26e5bda797

    SHA512

    34fa4ace23c5647d9b9c85e7007a08c3bf671589a46bcd1d37501f9aed7dc06ff207f66b7fe0c441e8aace2ecf9114fb7bbcb7640ab13ff05d84297a99b9ebd7

  • memory/2016-108-0x0000000004C90000-0x0000000004CAC000-memory.dmp

    Filesize

    112KB

  • memory/2016-126-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-144-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-95-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-83-0x0000000004C90000-0x0000000004CAC000-memory.dmp

    Filesize

    112KB

  • memory/2016-138-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-135-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-106-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-107-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-147-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-141-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-118-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-115-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-112-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-123-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-132-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2016-129-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2688-105-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2688-91-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2972-84-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2972-104-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2972-111-0x0000000001ED0000-0x0000000001EEC000-memory.dmp

    Filesize

    112KB

  • memory/2972-90-0x0000000001ED0000-0x0000000001EEC000-memory.dmp

    Filesize

    112KB