Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 18:13

General

  • Target

    04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe

  • Size

    1.7MB

  • MD5

    6e622fdbdb1e22411918440239227e3d

  • SHA1

    303c57631735e6bd551692f897de8bb01d4bec51

  • SHA256

    04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7

  • SHA512

    c66d6c94e6cb019799b85a54e06da91a5da790da4f0b0d5656a22120165fb95dda059211d7379e29622a341375d2482145ed0ae2ebfcf5b7e5f186b4941a0022

  • SSDEEP

    49152:VkxBRzmB9MQeNAnzXROwQ5Bn1roCm2SAUqFC4oGijsFP/z:8HqnXlnz8woeA1RoGCs5

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe
    "C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe
      "C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe
        "C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1200
    • C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe
      "C:\Users\Admin\AppData\Local\Temp\04e6a90f8a87e23fc492c440a1f2bd585c2d0ae23f5152d68d4fec4624b1cfe7.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3528

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\swedish animal gay [milf] feet high heels (Melissa).mpg.exe

          Filesize

          1.8MB

          MD5

          d56bb7ea4d9e81f4038f1c6ebbe74178

          SHA1

          966267a51ea95474a8e0c613562e55c87005742a

          SHA256

          f20dc7867705d3e11c8950145eb9423ce6bfd3f4239ba33eb6d7d0ef4bfb85e0

          SHA512

          f0b7f212715465a8db803713745a8ecedc3c5055a2739952a8ac3b0710d6d4d74c49b5a1d211ee3f6b11b08e2d4cf94a2cf8d7e1df5ad49457f9bcd020d5ac36

        • memory/1200-163-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3528-162-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3664-0-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB