Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 01:17

General

  • Target

    8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77.exe

  • Size

    901KB

  • MD5

    36e6f1987dafb002b19404c9508c6a3a

  • SHA1

    d84face4a94cf065d319c3b2339931bc2c678e53

  • SHA256

    8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77

  • SHA512

    6ace91d5a5f9e67acea49a52634456842139174ae49cdaa1a1867c18dc0dc73658a54b14b5d8935462bc4f199609b9c2eb273f8fc7b7ea4c34d119e24286f771

  • SSDEEP

    12288:JXCNi9B0DfNFHvV0lJUAhUmuW9U2UwMT/XB9lawaY7w8G+wLpyoF3vMFO/zdXxM4:sWanPKlrhUOaTZLf7w8G+syoF9ERe

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77.exe
    "C:\Users\Admin\AppData\Local\Temp\8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77.exe
      "C:\Users\Admin\AppData\Local\Temp\8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77.exe
        "C:\Users\Admin\AppData\Local\Temp\8b2b4d2738485721ca9cb437c488e55e1b654a0b4e769cc8f7f590c3ee511b77.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2652
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 376
      2⤵
      • Program crash
      PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\sperm animal big latex .mpeg.exe

    Filesize

    1.1MB

    MD5

    9dc510fcb7d1e58bb0f8d259c99cfbfa

    SHA1

    71cbc31d04d295c87b38df46c090f6bb2e93ad0c

    SHA256

    ad79468dd8c32ce8a18c44f8eb1034ad55a1f100c2d348aa7581b1c49b3a9acd

    SHA512

    2e816dd402bee62336bceec1b8102550ab1dfe5ecf62f4b419ec297fd8239bace812e4f251d3974283d27d93bb3ca44bd67ea0704ce8092b52fb54aec5e00355

  • C:\debug.txt

    Filesize

    183B

    MD5

    5a39e3c3fd006499ea1a8be830a51d4d

    SHA1

    c0fa6b3e35a7e044ed5450d87724f3c34641ce4e

    SHA256

    b6ab0c1e0a8915d6e3d2188f60d05edb8f6a7186fec921be676ffa98c0beef5e

    SHA512

    4c7f1c7e1974f105654765ad93c12ca26d2b926d265cd0e437a9a36afa528076e7629f7bbd9181c80f2d92c863746a51d96d2dcaaf86fd8296b8c5740fdaa01d