Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 21:07

General

  • Target

    06e84fbd8e5d54001214f5ecb9badc30N.exe

  • Size

    6.3MB

  • MD5

    06e84fbd8e5d54001214f5ecb9badc30

  • SHA1

    2c4cdcba29b651e180b6cbd671b48f7921049682

  • SHA256

    8ce6910a38feb7254289c5b3a3b40ca88a0526a2c43e870f765b2afd6fd8cdfa

  • SHA512

    e53492167b67c24acd8e84a5520eb5bdb2e67103db9e4be4a4e42d4b91900da9551436afff99d6559ec725d08cb756de0994b26751dc231ce70e97ca7d0db276

  • SSDEEP

    98304:tn2UgXq9ouFkULGyqobNq1Mft5rG6uPO276HoVNmnolMsFiHtGh1hN5DTlF01AD4:V2S9+ULdNPtbuPZOOmnqogHh/W

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06e84fbd8e5d54001214f5ecb9badc30N.exe
    "C:\Users\Admin\AppData\Local\Temp\06e84fbd8e5d54001214f5ecb9badc30N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\06e84fbd8e5d54001214f5ecb9badc30N.sho
      C:\Users\Admin\AppData\Local\Temp\06e84fbd8e5d54001214f5ecb9badc30N.sho
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 152
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

    Filesize

    507KB

    MD5

    b6b490709cd8971ea3102b1a8ab133dd

    SHA1

    7ad77dea085c2c953a0b98ca2ba17e12581b86cc

    SHA256

    55d3086c7a2bccc69d217497cd075c418c07cf42fe5eefe3a5ab6232ee025186

    SHA512

    ef70a0557e7c94e34d7edf14fa6e87fc677e7765ed61e57328dff3762ef4d8ea7e29d965f524c598ab62f8724c427d611c78edb768d0d1f4de01564d3470652d

  • C:\Program Files\7-Zip\Uninstall.exe

    Filesize

    14KB

    MD5

    fac8f34d3b19008658bed40f64d47c06

    SHA1

    8fbfb8371f18822a9adac77189fd07134a6f9843

    SHA256

    376ca5131949ada9ba8e5b12e91f90bd4998c04603f7fe8618e6f87bff005874

    SHA512

    0550b98091d74d1a02e9a3a4eaa39f64b9eaf528571266597abd9624f7f80829e7068f3c2e1e9290d82366fec65bf93db26c4803774422c40a9ef06fb020c938

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    1.6MB

    MD5

    b9f97b2006bc393ae247c0aa01a009ea

    SHA1

    2ed32ed12b97e1d497c0eb19ce86bf8f24cc0569

    SHA256

    54f51595a5172317649ef5da596da2c765219c0000f8c9b77576c5863f75e48f

    SHA512

    79bc28b2bbbbe501896ab273765d91aa2e309c9141b39054eabd8461ee5c01859a01474f20c689b0ea8464cff232ccbc57150526ed7ec7689d4a201123b21480

  • C:\Users\Admin\AppData\Local\Temp\06e84fbd8e5d54001214f5ecb9badc30N.sho

    Filesize

    6.2MB

    MD5

    f1e82d254e13a870fbf61316b1769d71

    SHA1

    f593a3c5c116fffb99e67f32bbf01add71bcb384

    SHA256

    15ac52a5aec8e688aa34ddc707b8bd4d42efea8eaf9fe9c5600b56c70e255f2a

    SHA512

    a5869b53cca1aa85b2cee7b50399b9a0fb065492b891c7df21681d88086fe98500bf324cf7a8a268c3a053c5477936b2f6d752910441d9ae12d08153a785c3d6

  • C:\Windows\SysWOW64\Shohdi.hdi

    Filesize

    6.3MB

    MD5

    06e84fbd8e5d54001214f5ecb9badc30

    SHA1

    2c4cdcba29b651e180b6cbd671b48f7921049682

    SHA256

    8ce6910a38feb7254289c5b3a3b40ca88a0526a2c43e870f765b2afd6fd8cdfa

    SHA512

    e53492167b67c24acd8e84a5520eb5bdb2e67103db9e4be4a4e42d4b91900da9551436afff99d6559ec725d08cb756de0994b26751dc231ce70e97ca7d0db276