Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 19:55

General

  • Target

    249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2.exe

  • Size

    359KB

  • MD5

    4c1c10f4a0fb6909ef3234b5c7915eab

  • SHA1

    05e02f3665e34abda550b57a110f3de3d7c31a8c

  • SHA256

    249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2

  • SHA512

    7a578af5ee0c5fdfc5442b5543724aaaca36ac7ee051306e52ffe7d04e3d77ed864bb0cc3f2d68c9da8512eb0c119b78b52606eb18c096fe6063cecbc865e4b1

  • SSDEEP

    6144:dXC4vgmhbIxs3NBRFC3KsadP7qxBM+5vqVB/9515vQkqS934SG06YHElP6P:dXCNi9B7cKrzqxB5FkZvFquG06/P8

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2.exe
    "C:\Users\Admin\AppData\Local\Temp\249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2.exe
      "C:\Users\Admin\AppData\Local\Temp\249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Users\Admin\AppData\Local\Temp\249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2.exe
        "C:\Users\Admin\AppData\Local\Temp\249400b8d9e347228077287cafdbd1792ef6453689111700421059324a9729a2.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\canadian horse porn hidden ash stockings .avi.exe

    Filesize

    1.6MB

    MD5

    44f0779cbc4ef1654d4180076c8e3928

    SHA1

    72c55a0f3b32051ec79df8f505fcfe3093c49896

    SHA256

    5b4a2dbbe65c550c5f6c659f65be02323865b2a4c7e5787e8b808a63a1f66d0e

    SHA512

    1c283025a44e795c8667558e7b4b4c8abe9af7e35a3842ebd1ad966f5f8f9120aeb0eba89eb79d92c73d8441b96094a1458d9fabc323718a1b39ceacc6edce64

  • C:\debug.txt

    Filesize

    183B

    MD5

    31d71cd873fd93f1ed83044394c7cc9b

    SHA1

    d57e0b5b55fde7f0e4b9436845af1166855d3bf9

    SHA256

    d47a96f81937c1c544eff4fb52257ffefa89233bc6f058bbb7d2de0c30d70c1d

    SHA512

    ffa0a59c13fc85b58f066ada7dc05b5513f05686455e1e0e3e451d8b477080ecfa0dc381b77cfb8212d8de16c89f610140734759ee54312d4aed471e812d6855