Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 23:22

General

  • Target

    7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe

  • Size

    1.2MB

  • MD5

    0028b0c38cbf42035073cbb529298705

  • SHA1

    785e2773fcf807a931851a36fb31d644aea521e8

  • SHA256

    7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211

  • SHA512

    e6aaeacba2e122ed8669e0b6c841c7a273eb9683cf90001c2cfc933a29ed005dbe46b49a0c32b29e2471e427ce1d5a7436ea87244fee753c802e2daec43051fc

  • SSDEEP

    12288:A//vi9BtfC2LjSpAcQnZTGulFpYjZ4u3mQpGY1v9Nuy8+LMKkH/11wh6+eOrYHZ3:2w9ZrnZTHPZuWc1tSLmrY81UcfiR755h

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe
    "C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe
      "C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe
        "C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4768
    • C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe
      "C:\Users\Admin\AppData\Local\Temp\7a9feffcac4ceb7ab729a0e77c2dbc0736fd7ebc1943e3254828619294291211.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1552
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4472,i,7869973516895866428,11647313872437892197,262144 --variations-seed-version --mojo-platform-channel-handle=4416 /prefetch:8
    1⤵
      PID:664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\danish beastiality hardcore sleeping redhair .avi.exe

      Filesize

      1.9MB

      MD5

      11649471d26008591f508bda3769eb83

      SHA1

      a0839549a037d50547a86b1293b0e3bb34c95000

      SHA256

      906aefcb70897fcc9add763fa35948353f409cfac68ef8c38dc7918f64c96d4d

      SHA512

      f18a3fc87ed018d7a5eb9ab6d3d7fa310e509de18f21f3699baa4273ede88d73da7b06aaeb90aec043158de8f79b29cf4f38b4457a7a922e6f9dcd917a108f91