Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 01:07

General

  • Target

    954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf.exe

  • Size

    591KB

  • MD5

    fbb4b58b9e961a0be2b2c4d56d7f2ae0

  • SHA1

    93baec955e0c0d6ffd03b2ba600639ebfdd5eddc

  • SHA256

    954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf

  • SHA512

    19e1faedf58a7da7a5039357fdc447d91068dc9e042182c104580b3da87609f890453c9a37287f8bca9d1abfaa35a4c21ab5d086b2fd4af890f3cbef5ca7f210

  • SSDEEP

    12288:dXCNi9BcWu0MOHAgNepLtpYblIw9EdkLVa9jRB7/Rv:oWlR1A1pLYbywGdk5a9FB7/Rv

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf.exe
    "C:\Users\Admin\AppData\Local\Temp\954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf.exe
      "C:\Users\Admin\AppData\Local\Temp\954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf.exe
        "C:\Users\Admin\AppData\Local\Temp\954db779315b12e1279cc43a9f9e4e26243cbe817938ab96adc06f8c80775faf.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\beast full movie .zip.exe

    Filesize

    1.3MB

    MD5

    e16534469f7a163587ba0559d9a5ae8f

    SHA1

    857da6902ec094c44f877ea101e97317699fef10

    SHA256

    3a6970225aaa1f54f4e04bb7c36dc1693131ccf8cfc462dd70deebf88cf75561

    SHA512

    e64c14c6abcade1c3048149a2b4aa25eb2cb2d43eeaa8e153d6a1d003602b1c2c497e314032f8276438d0eae41faa878b401044e6a3dd78eaa1f38517f35fda1

  • C:\debug.txt

    Filesize

    183B

    MD5

    de16a60c950cebb65d93d6852ecc59a8

    SHA1

    da66dfe9802066833c544a3570d8c760bb91e9a7

    SHA256

    f29d77c3d4579a40e99180f01215f9b00c462c40753ba635adb907d7285a198a

    SHA512

    64d94413c5dc8a69b385f206352dac7d21068130354dd451604eeed86ea4d396a60b557befbad2be0fe756810cefba2d6d96f3b7cf8817c8f41cb1a9f2f56bcf