Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 21:08

General

  • Target

    34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4.exe

  • Size

    1.9MB

  • MD5

    22ba473e2677fa0949f632256a5ce217

  • SHA1

    7e6ecfe3b1133df5b71b26441ee5ece71b8d3d7e

  • SHA256

    34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4

  • SHA512

    7d7b1ef573f36f04f7b426e96b172e4b2fa3ce320e3380acf8c4f7adfa6a2620d20453ff3d723654aaaf01d31783786d4b118ab575b71e6ac46e4bdcc110986e

  • SSDEEP

    49152:VVXlktUaYMLK7gli+rFE5lq4i1oh4Jf7FN:VKYUi2NRevi164JzFN

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4.exe
    "C:\Users\Admin\AppData\Local\Temp\34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4.exe
      "C:\Users\Admin\AppData\Local\Temp\34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Users\Admin\AppData\Local\Temp\34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4.exe
        "C:\Users\Admin\AppData\Local\Temp\34cb7579ccb9b9d8f981b264f22eed9f1bb7e4299e1d74959ba5c21688c655a4.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\brasilian porn horse [free] .mpeg.exe

    Filesize

    1.1MB

    MD5

    f41c2d938e50fa41b89cba3627e6c31c

    SHA1

    36bd24edaa06418de7c90134e2ba6e72dbf5b57a

    SHA256

    28c80cca98de8f8e8544c44e57f4a62de010f2d8a46e1728eec3dd88003aa66e

    SHA512

    f4a411839097f75073584760578faf72d6bf34fc8a622d8105f3d88adba9595a64eba40c5079c9d18bfcc501339008b65fe52e880448175e4633a6929e546eb5

  • C:\debug.txt

    Filesize

    183B

    MD5

    681033b107d17c6b037d8c0ff647e6c7

    SHA1

    eccd5e68f60bd86b050cbb188be4c48d7b180c12

    SHA256

    f1b32ed31a02c3369a91e0596d71fb777d68c042ea6862c6d8503d1e37722282

    SHA512

    751154fe59cd520774721822a7f88657b5f36a1e42249e85c46044bedbb3a626f4674989333c16f32956463e8f1d6633aad65d94a7c50a6bd91601eab4ab96fc

  • memory/2136-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2136-63-0x00000000050B0000-0x00000000050DB000-memory.dmp

    Filesize

    172KB

  • memory/2396-64-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2396-88-0x0000000001EE0000-0x0000000001F0B000-memory.dmp

    Filesize

    172KB

  • memory/2404-89-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB