Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 02:53

General

  • Target

    2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1.exe

  • Size

    392KB

  • MD5

    407025b0442dad02fabd9a7f835f66d0

  • SHA1

    bcdfc1264cb7b364c69bc8ff63708dc3004c817d

  • SHA256

    2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1

  • SHA512

    d3b840338322524cc68afc91ec78aeecb5b77723513752e0a72152e1e66f6d00bb46c3f24a943effc682f88b731aa60b718e00d80adbe464c5f362e235b7498f

  • SSDEEP

    12288:dXCNi9Bg5li3LkIcM4CBazPKLb368arfm5UYCO:oWgeorjEO8Um5UYp

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1.exe
    "C:\Users\Admin\AppData\Local\Temp\2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1.exe
      "C:\Users\Admin\AppData\Local\Temp\2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1.exe
        "C:\Users\Admin\AppData\Local\Temp\2fc90d54e037126a73c8065f847fd77de73dfb0c7150f1ddbee7e6016e9bbfc1.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\italian porn hardcore several models cock .mpeg.exe

    Filesize

    1.8MB

    MD5

    f98cdd4cd0b2ff07129a123e3ed8a203

    SHA1

    a7486511c9224cdacb8d85992954708e12058dc5

    SHA256

    6f2ce8a14d65bcad1771fcc788e12b11bef5d792039acb5af859a23306639c82

    SHA512

    1961d6a30dcfe4927aa9ad1935b824b7093b56aee165032843c3ae2a10ae15fb7523bfdf24b83a5535c0f8b79cf0d7cc4426b4c3adbaaf9d62ce5f2f2da38581

  • C:\debug.txt

    Filesize

    183B

    MD5

    5c627c7d01967c53e2fecda87c15202d

    SHA1

    c7ec10c7876034025c750222f6e6f1f920488e83

    SHA256

    e7b9066f8bf3d0eefda9627cfec5934be24e5cba5f0a0894863a562c9d5426f1

    SHA512

    8915f5daae18ba155bf7ef0c0eede5dd346c0128cb9fcba3ab44746e68e55fbb608527b0095abe8a34520eede12a8542c85ba4acc3a4ecab6934a56fff2aa691

  • memory/2748-32-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2748-66-0x0000000004D20000-0x0000000004D4B000-memory.dmp

    Filesize

    172KB

  • memory/2848-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2848-31-0x0000000004CD0000-0x0000000004CFB000-memory.dmp

    Filesize

    172KB