Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 18:22

General

  • Target

    0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f.exe

  • Size

    1.6MB

  • MD5

    1491bbe84e8aaa83807b888c3a938eec

  • SHA1

    538283d39a8a79c3a74b18e1fa9b55de963f7392

  • SHA256

    0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f

  • SHA512

    2919eb6618a2003827df467c6d9efdb64a6d97edf2090a4235e9f94a8fc0f969d08dbe58a9d63364fb86a8312d1b7321c8eb50154716e98ccf81cb5a8da2566d

  • SSDEEP

    49152:VzY/VNZXZAR0QN063qIacEEVGw0hvNMY9xs4:1Y/VNbShNjqIacEEVmhvFs4

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f.exe
    "C:\Users\Admin\AppData\Local\Temp\0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f.exe
      "C:\Users\Admin\AppData\Local\Temp\0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f.exe
        "C:\Users\Admin\AppData\Local\Temp\0840b755947d033cd9a22e3e90f157720b3057e027347ac49d7f2498c287df2f.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\swedish action cumshot lesbian (Karin).mpg.exe

    Filesize

    1.6MB

    MD5

    a391b1b61dc319d2a9e41f44e1bb3f39

    SHA1

    c70117dea7e22481cac7b29bf44c2299d576c44d

    SHA256

    f1ce89c60f9bb515a50bef844121e5a1245b5f8fbc894a9a556ad5ea003a589b

    SHA512

    0db99b5a2c56f5d5467c0891f1b142b198eb7f8f9021692ce189b9a79e95866398858f36cfdcfffad80b2d13c781c8511398ed0b8c193054675539156396761d

  • C:\debug.txt

    Filesize

    183B

    MD5

    835d7ac88628fad72ec070c0edbd9d8b

    SHA1

    7e3a97a99e0e256f1902c496022c74bcbb30f619

    SHA256

    ed6040df288e779326f652e3f746585e1e98cb6ebc86b9b5ce27af88b2e5e335

    SHA512

    8b04620e379d3d4419f55e66d4f12a7dc5ace485185d725dda5c005e34097eb08669f39372a82f62b6834245ec2495ab3b941abdb93be34ca6ff95cfd7536fa2

  • memory/316-86-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2360-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2360-69-0x0000000004BD0000-0x0000000004BFB000-memory.dmp

    Filesize

    172KB

  • memory/2576-70-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2576-85-0x0000000004DE0000-0x0000000004E0B000-memory.dmp

    Filesize

    172KB