Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 20:09

General

  • Target

    305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3.exe

  • Size

    371KB

  • MD5

    7fd21bcc965d2e1dd43e5950c343bd21

  • SHA1

    bc8e77818da7c3feacdd1144e7080f4c63ba4f86

  • SHA256

    305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3

  • SHA512

    5ef7d2da6e4c02e0e8ecdd634b1464352d3f6bbaad2ce4d23417aec324a291601671254e84b35dab604f471cc2004d554d4dc27c86e1cd047e3c4b61adbbf56f

  • SSDEEP

    6144:A//ICMmDRxs3NBRzQICu/ScU6CKnlWlCeRW1o0HYGMwMFdRSVNYAoLPtEmT0k1Nt:A//vi9BUiS1Zu1tYqMHRg6NPtEtXQ

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3.exe
    "C:\Users\Admin\AppData\Local\Temp\305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3.exe
      "C:\Users\Admin\AppData\Local\Temp\305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3.exe
        "C:\Users\Admin\AppData\Local\Temp\305ab7921cdbadcbe338640c1cce32827f2652d897a630066947f606b815fcd3.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\tyrkish horse sleeping granny .avi.exe

    Filesize

    1.1MB

    MD5

    9368233dca488ec1950e1ff051dadcf7

    SHA1

    6683e04c9e866f41b282fa3248d5820cce3b63b9

    SHA256

    3fa86278ed9bccc80f7bde8c5fd87881c5531fd892c3fdd7aa809224466f2272

    SHA512

    4a081568a033b0e625abd8ae322c06216d4c688fa50aa57c580c63404e9f544e928b786268a6f881a2ea6097d7c20cbf6d287701727c53f4c74ab219d022d321

  • C:\debug.txt

    Filesize

    183B

    MD5

    591bfa1d964480c0401e68422626b72e

    SHA1

    e8275d54d331061cd218ce5a52d294e3283be511

    SHA256

    ec26d09262edc12b3fd7b44ad225e5eb9ae533c1c15c7714dbd528ea8522bab6

    SHA512

    d4104ee77b82490b487c5e6e13bd2bb399ba05611fa7fb7beb314cfa1282d797626e986f7dda36fe600246444bc8a2c13facf3e2f10ac841ff15b23731f9fd69