Analysis
-
max time kernel
94s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
bd8f42e4691316404553101af4b6fd10N.exe
Resource
win7-20240704-en
General
-
Target
bd8f42e4691316404553101af4b6fd10N.exe
-
Size
1018KB
-
MD5
bd8f42e4691316404553101af4b6fd10
-
SHA1
05d2100f15ed052bac7bf4b1bb71d8d4f2dc2bf4
-
SHA256
bed13bf5b39bcd7ae07fd59ba3faeac74f5c03fddee6b92c8496803118402ad8
-
SHA512
55618aad9f4eaa761b5e8440eaddfeeab64896408dde8222b0e56e27ca7f1f1bf2dd7b4a9436fd5eefaafbe87796d692d2ea954204c17e5c89e70c7883e83c50
-
SSDEEP
24576:bnETX1hQfJuu5x8/elO3gsyZg54pjjAx+:rETX1efJug8OO3y049jAM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 tmppack.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmppack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd8f42e4691316404553101af4b6fd10N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3276 bd8f42e4691316404553101af4b6fd10N.exe 3276 bd8f42e4691316404553101af4b6fd10N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3276 wrote to memory of 2208 3276 bd8f42e4691316404553101af4b6fd10N.exe 83 PID 3276 wrote to memory of 2208 3276 bd8f42e4691316404553101af4b6fd10N.exe 83 PID 3276 wrote to memory of 2208 3276 bd8f42e4691316404553101af4b6fd10N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd8f42e4691316404553101af4b6fd10N.exe"C:\Users\Admin\AppData\Local\Temp\bd8f42e4691316404553101af4b6fd10N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\OXKEKDRHLWURHPOLBMVXUOYY\tmppack.exe-y2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bbccaf41a1428f1a33357a10bc094edb
SHA1612281956e1b9d895bbc078c271846f881e4c264
SHA25650fdf1d3cd943aea15616a56391e6f388ea42be11ea3c269412af5b09ef9fbaf
SHA512af6a25948746cfcdc0421ac1a96d2efa3fceaf9093c3931d25087d9c12258f06a410e7f7d5260d17d6dbdc00dde74df5b25cfda0260ac531a07b7a200ec41bb9
-
Filesize
981B
MD58a5e1aad7303d8174cf3ba5e3591624c
SHA15bc119db938869e24dc18f9f70a5039cefaa9b19
SHA256a3dc8aa222cb5edb0d18f4526a0b0859647b48b4bdc52a5c9431c4ec6779f538
SHA5123c5c491234024226e6486f7426ab941a38701e33a0d1c70012cd64080904c2ee3f4f792ed992e3e605357471bc4da30c661b843b6b2501c4bed4041c4a6bc390
-
Filesize
5KB
MD5550a14df20d0eba55a36573b8a6a134f
SHA151069bfb0170a87965873b718cd96197b64a3246
SHA256c86a697d4db9acff79202efa1350db545eb5edfad5820992bcc140bac51a1af5
SHA51271d5dba9734a40fb37d3cba4cac52d3b0372e1d9eea0e8839117437d85f7b22aae20cc0e02faed239c29bf81624785d04cc62756dde1341f5d61029a94408fab
-
Filesize
1.3MB
MD59161de0c745a2467e8b1efa7fe828986
SHA185ae7bf18c3f0cc68a8489363d883594ace964ca
SHA256fb46408ed5b0aca2c7ad9f33916f09b212c720473ec3222eadd7b66383b4bc21
SHA51246b211ad8164ff11a4a48c5ad64478c148defe001cf9896354a0b002f9e1936ca251382a1f0ecf78e5a965557ad44716fd73c0456aae57543cb6d180e76ffd69
-
Filesize
561KB
MD5191daa51ab8e3dbe928711f001dc3adb
SHA184d307554c31dd13b5789109505b7394f34c7836
SHA256a39c78f61f42f22bfb40cfe9f56239bb15d7ea6ca153a5ded61c36997a61fa45
SHA5121b10db82956d2092bee5b0a3f954b47bbfe669193d04fb586545a8a8167d84dc1a6f8aab8bd0d1695145830c733e0fa3b2505223bd50495a65bae32b04837a51