Analysis

  • max time kernel
    313s
  • max time network
    318s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 13:10

General

  • Target

    e035a1741d10a75402359dec278717e4e32b9d2a9ec1e1834710a2b67aa21f5f.exe

  • Size

    107KB

  • MD5

    6c34b57397081898a8e3b3f90671afd0

  • SHA1

    9741b0ce05fe1f11c6a1b768c12960cdcfbcce8b

  • SHA256

    e035a1741d10a75402359dec278717e4e32b9d2a9ec1e1834710a2b67aa21f5f

  • SHA512

    7d63e95295273dead2498fe97465a577dbfd9ffb4cba9e37c5306e41083f6659d8f79653e226df2f059174f56985d23b56ce699316f477e5169d975781de7be4

  • SSDEEP

    1536:tlDLR6JCLRMfXbOhHULmnPKZ61KiPlQI+2cCKNE+EkvOhEEq/D/fy:tlPOfXa+LmPK/0P+2wNgkGh1q/D/q

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e035a1741d10a75402359dec278717e4e32b9d2a9ec1e1834710a2b67aa21f5f.exe
    "C:\Users\Admin\AppData\Local\Temp\e035a1741d10a75402359dec278717e4e32b9d2a9ec1e1834710a2b67aa21f5f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4341FRTB.bat" "C:\Users\Admin\AppData\Local\Temp\e035a1741d10a75402359dec278717e4e32b9d2a9ec1e1834710a2b67aa21f5f.exe""
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\SysWOW64\taskkill.exe
        TASKkill /f /im "EpicGamesLauncher.exe" /t /fi "status eq running"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2252
      • C:\Windows\SysWOW64\taskkill.exe
        TASKkill /f /im "FortniteLauncher.exe" /t /fi "status eq running"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2980
      • C:\Windows\SysWOW64\taskkill.exe
        TASKkill /f /im "FortniteClient-Win64-Shipping_BE.exe" /t /fi "status eq running"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Windows\SysWOW64\taskkill.exe
        TASKkill /f /im "FortniteClient-Win64-Shipping.exe" /t /fi "status eq running"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1016
      • C:\Windows\SysWOW64\taskkill.exe
        TASKkill /f /im "EasyAntiCheat.exe" /t /fi "status eq running"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
      • C:\Windows\SysWOW64\reg.exe
        Reg delete "HKEY_CURRENT_USER\Software\Epic Games" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2912
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /IM "EpicGamesLauncher.exe" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2628
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKEY_USERS\S-1-5-21-2097722829-2509645790-3642206209-1001\Software\Epic Games" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKEY_CURRENT_USER\Software\Epic Games" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4341FRTB.bat

    Filesize

    60KB

    MD5

    466a9665349fecae7f7e20b515244b48

    SHA1

    4071929bcb4b0300264b006064643ff3d9fa7f26

    SHA256

    90e254b4ed587185a92f4844c6ff4950d2b942ee93d72501127f9a250b2b886a

    SHA512

    096021b9fccf4928cf6cd6130a819e7b5009cd96d8db5d736ab4d9c5c9f8df908e2456d35aa5c295464f4b1bcb4ddbd05cf855e511aa1aada426fd91bed57a9e

  • memory/2820-2-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB