Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 22:07

General

  • Target

    524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977.exe

  • Size

    281KB

  • MD5

    8738913ee8d30e41fb9d2d7ea40f0e88

  • SHA1

    153e77b0b66f38bbbfdaf2580e7975f0bf9bdf65

  • SHA256

    524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977

  • SHA512

    b7d573c1c22dc41aa3d01158b7961de753eb1d90e222901d3f5696e21639362462e13505d24fac7118e673ca490a868658b030f05676236dcf1c5f8166767dad

  • SSDEEP

    6144:A//ICMmDRxs3NBRfFuOtsgEqRdFB9xuzfpx2rO:A//vi9B1tbEGzVsxb

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977.exe
    "C:\Users\Admin\AppData\Local\Temp\524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977.exe
      "C:\Users\Admin\AppData\Local\Temp\524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977.exe
        "C:\Users\Admin\AppData\Local\Temp\524316d151313fc6b0c0bd4ced5abd46465cce60c9241efbc63d1f347ba2a977.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2144

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Windows Sidebar\Shared Gadgets\lingerie masturbation feet bondage (Janette).mpg.exe

          Filesize

          1.7MB

          MD5

          921f3b8abe648427911574f0c11b8575

          SHA1

          e9b5e46f9daa7921a058b2899ab62813576b1207

          SHA256

          0449febcc45e9baef1dfe5e16526c7a8486f9491cc54de71384350b98040093e

          SHA512

          1ff898b764887586cfee56c92ed460a79674e4991ca586e002538674cba3549e850d082daf788fefef2b6beb8f61316d6d6bba1b49ca0d7e39a733899772ceab

        • C:\debug.txt

          Filesize

          183B

          MD5

          ae9e5c8834951ae42cf13ba96119f964

          SHA1

          0c6a30dc41ba050dacb062f11220ef1ca59b3d75

          SHA256

          10d45a25ca8ee9f0692139cdf5df19e4fc6a8a59db626d170052ea5d875b6806

          SHA512

          c891170868663c753c036dd70dc326bc7c6ccb6b8f75229d63fccc57cb114571757da2550f246d39815d7d7704502c68f1ac2b80dca534a55e5083bf2edb3789