Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 01:44

General

  • Target

    a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0.exe

  • Size

    2.1MB

  • MD5

    734dcbb25a384e87e4367b95be5a41f5

  • SHA1

    45b303dc01b0e40569d4d398f52fc95a596d6505

  • SHA256

    a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0

  • SHA512

    3c7df5252216a54dfe15486b0b7574e4d0f90a1fc8e76b0c9d461fbebb2f5a1ea61c1173d12e7ce51ef56f9d22ec7dce38a1c93d232bd6237fed705d04cec75c

  • SSDEEP

    49152:NoJALDP6Y4RaPA/oE16qDvNBwupP3XaadeZuCWC5yNNTjzJ2W:NwAVQaP7ZgDwjBulC5UVz5

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0.exe
    "C:\Users\Admin\AppData\Local\Temp\a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0.exe
      "C:\Users\Admin\AppData\Local\Temp\a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Local\Temp\a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0.exe
        "C:\Users\Admin\AppData\Local\Temp\a73968b5937aa5cfec0cf47610fa8f3c33e13d38318411e8b4e442b9ba61bcb0.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\swedish bukkake hardcore lesbian fishy .mpeg.exe

    Filesize

    706KB

    MD5

    41b925c5039a39f11851aba0a78c872a

    SHA1

    46c83a70829d4b2b660a716d6ec9e677786c3857

    SHA256

    e865c54e53da7cc49a1b5949be615eeb019b68cb7eae31cbe1b16f6930ea4f1d

    SHA512

    c44e49a18a2508bf7a4d01d5d2a27a4ed621c069b1745801bbd9fb0eaf6a5dcda4654f64f3f8ada622f061b3a3964524387d6d53ed32db2782c6f4546142315b

  • C:\debug.txt

    Filesize

    183B

    MD5

    1266b1099b142e26be2f688352f65b53

    SHA1

    c0f1428b096b6666a584990c03f4b589f10520e2

    SHA256

    1c15aace5e2e4f45c25c025f9d0376a5ce1d647ce228ca45940fbbb96f00c96d

    SHA512

    80e28ac375d478dc744bbb03814d89d5f86e9d92b74bd06f99f8ca2fadafd6ad597b9f6aa0817701ef4e8bdd9b9d0f7bc758d799d729d53b0ab4ae77ec0dcc1a

  • memory/1796-90-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2208-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2208-54-0x0000000004960000-0x000000000497E000-memory.dmp

    Filesize

    120KB

  • memory/2208-106-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2208-108-0x0000000004960000-0x000000000497E000-memory.dmp

    Filesize

    120KB

  • memory/2548-55-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2548-89-0x00000000045C0000-0x00000000045DE000-memory.dmp

    Filesize

    120KB

  • memory/2548-110-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB