Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 10:39

General

  • Target

    b3b9f2cbab4329d82b96f29f221071809c615a2797f82dfc3acb6c5049177f88.exe

  • Size

    78KB

  • MD5

    989227e985cad6220db67c3bd9de6a78

  • SHA1

    93ee9707c4dc3911303a9b23b375714fdbbb8601

  • SHA256

    b3b9f2cbab4329d82b96f29f221071809c615a2797f82dfc3acb6c5049177f88

  • SHA512

    712402b3c1448c9e097faf2ce6b8c5c8412c4b2910b53e4c32aee6ceb892fa200ae8f60eff979e0fb46aa42af20ef6f9498eea6c7a6dda643f5516eb40917544

  • SSDEEP

    1536:p4q8Q1xZtffrb8sjPFNhTYsFFrzckH2fmitNV9N+Mf1yUfw:qKtfDwsjPThTYszDH2fLV9N+c1u

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3420
      • C:\Users\Admin\AppData\Local\Temp\b3b9f2cbab4329d82b96f29f221071809c615a2797f82dfc3acb6c5049177f88.exe
        "C:\Users\Admin\AppData\Local\Temp\b3b9f2cbab4329d82b96f29f221071809c615a2797f82dfc3acb6c5049177f88.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4F63.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4868
          • C:\Users\Admin\AppData\Local\Temp\b3b9f2cbab4329d82b96f29f221071809c615a2797f82dfc3acb6c5049177f88.exe
            "C:\Users\Admin\AppData\Local\Temp\b3b9f2cbab4329d82b96f29f221071809c615a2797f82dfc3acb6c5049177f88.exe"
            4⤵
            • Executes dropped EXE
            PID:3736
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1200
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3852,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3784 /prefetch:8
      1⤵
        PID:1244

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7zG.exe

        Filesize

        742KB

        MD5

        8989db2c640aec0522fdae2c32b4b371

        SHA1

        6633a9a9b26e43a5ef99b23fb2be74ce74a86dd7

        SHA256

        e71588b885af1d1fb260fc1f339be9d072e43474858f32597479977a8980b66b

        SHA512

        cc254993877bfcb5fdc9dbd30243fef34c89b68304c34b6daac60e2ea13388aa544627a84e6c55551a91d86458a554bb8505ea40575156cc562548aa0ec00292

      • C:\Users\Admin\AppData\Local\Temp\$$a4F63.bat

        Filesize

        722B

        MD5

        5ae9cf9a89fbe0c095ae93cee2a3959c

        SHA1

        82abda679d1e929ac0c5c67a9e068123cfe27382

        SHA256

        ad70b9543a57b9da4ef97239160bb888a3b9cade9bf2dcbff31e15890d6b58af

        SHA512

        945222c1610b1b3872c4d04982ee9fc8573f216dd523347d3cde3188204dcfeeb85349fd78ffe75e247ee1340af0177d67b7b55dc8ca8b19cf40cbec82571d4c

      • C:\Users\Admin\AppData\Local\Temp\b3b9f2cbab4329d82b96f29f221071809c615a2797f82dfc3acb6c5049177f88.exe.exe

        Filesize

        20KB

        MD5

        a8b499100141742fbb90089fe4c5f90e

        SHA1

        32dd5fdab96a6693c27c8b6cd8914ce213164336

        SHA256

        d6d2a0e5cdacdbfe30eb261204a019fbb835da0c7d42d5d4d935ac37077ac179

        SHA512

        8782c7abbf60a1ff773d742c8e831c186d5e79c9472fa291c11f827dbe5adb04f7b24045b54eb22bdf27a1accbbbc87458ab1f3dd37054d0f68a398809aa89ce

      • C:\Windows\Logo1_.exe

        Filesize

        58KB

        MD5

        c57a5f3267ade275e3428594e70624e2

        SHA1

        c360261c260817fb81dbf4d8c8f91079e02a8e3c

        SHA256

        b98d086e9ca5a27d9b051874752fba6044dcd37cbc6e87760a7f2332e0dfaf13

        SHA512

        dbfd7e5c6b5d37c3bae3addd4f4b1f51584a178da3f461d00ae2b0875cb6744866a54b0ec6d4df2d0a84063f688092a79abb8611368d27b02f61456fa9c6545c

      • memory/932-7-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/1200-232-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB