Resubmissions

26-07-2024 18:13

240726-wt3ltsyhla 9

26-07-2024 18:07

240726-wqpwkavgmk 9

Analysis

  • max time kernel
    1050s
  • max time network
    844s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 18:13

General

  • Target

    01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5.exe

  • Size

    76KB

  • MD5

    a5e304adfddfc62a9de7aaaa94e96812

  • SHA1

    18e1d5d16d3882917d151a43c437af87cce9c58b

  • SHA256

    01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5

  • SHA512

    76ebd68318519805c205480c07d8fa03ab767f8f54acdb70f0434b76ad744fa1736e43d62c2758536c510cf508b6bbea7d217a5167594b98b67c9c704a5ca492

  • SSDEEP

    768:W7Blp+pARFbhtlmlQ3y3RWvf+wi1x9f+wi1xBTCcX8vgCcX8vSd5hdx8M8YA7B7S:W7Z+pApfGQ3y3RWvfmRfm9sKsSd5gYv

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Renames multiple (16798) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 39 IoCs
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5.exe
    "C:\Users\Admin\AppData\Local\Temp\01945f8973c0f2ecccf5adbbb8680cf1b359c1f55158597953254ca0d39e98e5.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops startup file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2200
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    75890400a4f45c2961d0212befda3bcb

    SHA1

    b8f554c95de668fbec935ea574fcc48a507b01e0

    SHA256

    c86f4aa2e9b2e1279805664eb5aee0899a2db6ed1019fad49b98b23203d505f0

    SHA512

    1714cc1d4fde3c0b24bae66f2927baab76a2a897253385e353943ae88476a435f0a2f76154712d79da4eb023f8e409ade98ccf4c7464198069d3e41e2c210f20

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    93f5e77920fe29efc9ff5c2d35fb4f46

    SHA1

    5c0182f1c76629954c8ca3316ba828bceb4e074b

    SHA256

    c24769b3a04b06b24ab6d792046aac33ea457dd10b5840d284c9443760e49fc5

    SHA512

    4924c405326009ddf0a34889fd8cdde08de5d41050a5e384735140328da86bd298c2f8d3f9d85d1865c3f72b40be76d8e9b6207d9eb1289d3da0aeb24bdbf277

  • memory/2944-69-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2944-72-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB