Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 23:08

General

  • Target

    781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a.exe

  • Size

    875KB

  • MD5

    192424ca943fa7e90a7ac8a2c608318c

  • SHA1

    fcf5d626d731a5cf62eca91fed6db42b60e03806

  • SHA256

    781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a

  • SHA512

    70806408eefa958222b9c6c3d03c5857962803287f6c14a0c65c0fd425de8e5fc11c4501a74f504301b9da0adb6c683629a0c61c8eea67396a485f3362bf3205

  • SSDEEP

    12288:dXCNi9BaKvqjWfMGbqnsZQPdi9y3tgvxPL98rk8a5vUS47ymM6rq6NTVVFZnnvma:oWaqqjWEGyWQ736PL98AvNiyejLn75

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a.exe
    "C:\Users\Admin\AppData\Local\Temp\781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a.exe
      "C:\Users\Admin\AppData\Local\Temp\781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Users\Admin\AppData\Local\Temp\781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a.exe
        "C:\Users\Admin\AppData\Local\Temp\781d8145f691e7ad02276a19e6e85783fda1363eadd285cb3e3cc24263d60f7a.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\russian action hardcore [bangbus] .zip.exe

    Filesize

    911KB

    MD5

    864017737232e2bbf24c57c8a9df41c6

    SHA1

    d603471a0f5cf5f13b86ceec9c2157af506cfef9

    SHA256

    bac9efe30e7d2aeb7e169720ef87ff4b36eebb46732d39111d3515d9f9a3058e

    SHA512

    2224de1c44d5f9c1172875f696bebcff4bfa5322e5f5c1f42f097a30b25aeae57ea337afa5d7b31d2d417481748dd6ff63e7fc5fc4ac0ae51fbb85deccecf862

  • C:\debug.txt

    Filesize

    183B

    MD5

    ac1ab2da30c2873f6dba5722985d43d3

    SHA1

    5612e412abc9bfa6fb5c0ac8ec681f866887def8

    SHA256

    343d783ba3b0270b7a8d2a7c9962b64fa6cbd667e0aa9a173ade7a7bb3801658

    SHA512

    5e78e165860f76dff921248a9de766cda842105c663645aa5f73740f9b0431ce3072e7d2bdbb7c8658ec6ea0f9f79b2cd4250d4ce8a4f519c787c07d156b1ca0