Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 02:48

General

  • Target

    cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0.exe

  • Size

    667KB

  • MD5

    639507e0f50d6c1f31846c5c555b0277

  • SHA1

    918b797f61120580e8dd0c4344fb680235cc643c

  • SHA256

    cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0

  • SHA512

    858d84e086def9b08b8e4c306bcfb79012693225fe0089c44b2093039372f2b60fe7388b65d18be440761420d0c44b085223e5cf80d6d19e71e6d1aa052746e7

  • SSDEEP

    12288:0EQoSCP4x7Quj4Z3N96eF4MobeHp11g8QZIsdeqTzRRBizCKkpDUnzeN/:0+i7B4D0MNp1OZZIlqT/B+CKcD+z+/

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 17 IoCs
  • UPX dump on OEP (original entry point) 20 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0.exe
    "C:\Users\Admin\AppData\Local\Temp\cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0.exe
      "C:\Users\Admin\AppData\Local\Temp\cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Users\Admin\AppData\Local\Temp\cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0.exe
        "C:\Users\Admin\AppData\Local\Temp\cd3938de54805eaa1383185bb68b0b6239f193d309f5c5225c6789130a779dc0.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\lingerie porn full movie bedroom .mpg.exe

    Filesize

    751KB

    MD5

    fe415c53c4852796efea6c81d7a1c715

    SHA1

    8a8520740bfc73001bcb9c5d620571a2d9cdcf5a

    SHA256

    512e67af999fc620c12a5e5598bc0a5e9f238c7df3bacb73386bf3b28cff55ba

    SHA512

    1b097453b22992af1db269e2d557cfe80883f1ed07ad02eefc87783a9f4cb7774f895b16292f60da2361dc7015603b8250d3975079991b370a29e4cc03a0ffcf

  • memory/2356-111-0x00000000047C0000-0x00000000047DE000-memory.dmp

    Filesize

    120KB

  • memory/2356-66-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2356-90-0x00000000047C0000-0x00000000047DE000-memory.dmp

    Filesize

    120KB

  • memory/2600-105-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2600-91-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-112-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-123-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-106-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-107-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-109-0x0000000004730000-0x000000000474E000-memory.dmp

    Filesize

    120KB

  • memory/2924-65-0x0000000004730000-0x000000000474E000-memory.dmp

    Filesize

    120KB

  • memory/2924-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-115-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-118-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-93-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-126-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-129-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-132-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-135-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-138-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-141-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-144-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2924-147-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB