Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 20:24

General

  • Target

    38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe

  • Size

    3.9MB

  • MD5

    5abb7e5df71fc2e43d508cde6c00cb50

  • SHA1

    5711c8c4de192e187820cca35e8b91094f5e1f51

  • SHA256

    38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1

  • SHA512

    fef56f75384d7c80915d84a3df202df33a1b4aa7d5b36d398408bce6d1cc950ba2ba52c5a6d547af0d5158c8ff6a890e5e3b3e4eec43a091d5d964f54cd46484

  • SSDEEP

    98304:q6666666666666666666666666666666x666666666666666fwwwwwwwwwwwwwwf:PXpqm+2l75t+mXNqMmDcI3CY

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe
      "C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe" --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=478164896
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4324
      • C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe
        C:\Users\Admin\AppData\Local\Temp\38f14c76ddd768139f9f3b997642faa07e93d9da00d74a24f9c028348380f4f1N.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=4324 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.7.4.1317 --initial-client-data=0x2b0,0x2b4,0x2b8,0x28c,0x2bc,0xf6ad40,0xf6ad4c,0xf6ad58
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.log

    Filesize

    1KB

    MD5

    f4ef5d0f33e9032873d66d3c42be7b9c

    SHA1

    341f92054eb703003d89577b0e64d09283f73690

    SHA256

    585d4d23d760c60b4d98bc2edfd54369818868bea1844ffd98900ca8080fc5d4

    SHA512

    c78c3262b405a2399d06277130e2e69487e374e93097088a4a853ffddbf5ab10ee48b4ddd7e83a6f998e9fc048233ebec4eeabbf983e5395b4084e0891f5b1c2