Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 04:12

General

  • Target

    e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe

  • Size

    1.3MB

  • MD5

    704a0ee4bdd36792d51413a3a62c715e

  • SHA1

    81e5c1c2dcd261c09d155b8ad756265c36914965

  • SHA256

    e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d

  • SHA512

    48c35a83c7f4da646fea8fe11ecc894b0dccfe200713362d853565f2b2ae673e6ed689dd408702cb35591468d6012110cef8a79b12b680f5477d24841f382238

  • SSDEEP

    24576:oWGL1VufX6u3QLEHEaIlBMuqoTpqEuddaefVyHneIanevpiDbBr:VGL1cL3QCEaIlBltqEuueg+Ianbpr

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe
      "C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3420
      • C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe
        "C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3676
    • C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe
      "C:\Users\Admin\AppData\Local\Temp\e4a8428913b966b35c51cf5df9a3d5eb96dd2d97f8def0bc5f05fbda3b28344d.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\black cumshot lesbian uncut .mpeg.exe

    Filesize

    1.4MB

    MD5

    f4549a61b3813399f02c2237f9f96371

    SHA1

    9f5d4a9e4cb1c7aa2a2a2fe4338af3eb43262385

    SHA256

    981965181f38d0ee4e3c071b71b8243a00dca3a7bfbeb8a6f006ed5df3730fc7

    SHA512

    e875be7c8d33937e0e6060388b144441dcdd389094d42b3d291106d9f2e28981b0a99e97d1465b7ec9fb8de4299fe93d3cf8bbb111c7e23eb281406434ca5aa2

  • memory/748-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/748-244-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3420-22-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3420-245-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3676-247-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4732-246-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB