Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 11:49

General

  • Target

    b4fac2c87fe87f91e22bcda2ee06d6def08e11843833622b9b905533bf3074d2.exe

  • Size

    120KB

  • MD5

    89d0ef0f351ec697dad109c133d71d5f

  • SHA1

    b87b217b4d9023143ea4bd42eff931ac4edd76c6

  • SHA256

    b4fac2c87fe87f91e22bcda2ee06d6def08e11843833622b9b905533bf3074d2

  • SHA512

    b35c46942424f2e4521360166a6faa28771c6efbe0d5a612b9a3e266a1298e6da21d7de5d28294db6ae772b1dd7df6849a827c8e95e7b81d415e9b66da9fcc5e

  • SSDEEP

    3072:qKtfDwsjPThTYszDH2fhhiWwCALQ703KLTes85I4Dk:BtfDwsjPThT5zL2mo4V3KPjR4Dk

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\b4fac2c87fe87f91e22bcda2ee06d6def08e11843833622b9b905533bf3074d2.exe
        "C:\Users\Admin\AppData\Local\Temp\b4fac2c87fe87f91e22bcda2ee06d6def08e11843833622b9b905533bf3074d2.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aEC14.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Users\Admin\AppData\Local\Temp\b4fac2c87fe87f91e22bcda2ee06d6def08e11843833622b9b905533bf3074d2.exe
            "C:\Users\Admin\AppData\Local\Temp\b4fac2c87fe87f91e22bcda2ee06d6def08e11843833622b9b905533bf3074d2.exe"
            4⤵
            • Executes dropped EXE
            PID:2908
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\$$aEC14.bat

      Filesize

      722B

      MD5

      c522abdf6223dc38c92aaeef239b3a73

      SHA1

      bf5986966bae5077eeef917c0bac397996d75f7f

      SHA256

      56e0ba68ae7e8069063afe5c4c51e609cd1eaaa1ebdbb811cc1eb83c3b5717ef

      SHA512

      5df15d76f03183532a41afb420e09b2ac96089a57f9c8fea4948733410de4cba0a6147be96e70d7bd1fb2c1a0307bc9e0db43a8ec6344783b25f650278eda3fd

    • C:\Users\Admin\AppData\Local\Temp\b4fac2c87fe87f91e22bcda2ee06d6def08e11843833622b9b905533bf3074d2.exe

      Filesize

      61KB

      MD5

      a974a1ba752263965a36032abbf355bd

      SHA1

      c86c1d8fa9158754bcacfc1cdaf6fd3756b6d8d3

      SHA256

      9e20583e3cee6094d25c72741b51acc888c8661346666b4641112baa90066769

      SHA512

      8eac9b149f1b452ba1620fadb435bd2ea1aa4e9cbf7b8dac63d8f6521bd2c39f5447e93e682545ad7a7f7468a454d413b702bbbfe65a6b3d6436fc9b0a826ab6

    • C:\Windows\Logo1_.exe

      Filesize

      58KB

      MD5

      f7f5eb48411808b9b8f78784550ab902

      SHA1

      711c76e51664a533a4223ada6eae1d86bb103327

      SHA256

      1fe1d7738df394db3c60d7a95515134adb22fb7e5a552b1c9b7635a7fa6b977c

      SHA512

      61d8ab58e4c2cbf738459f5947dedae3423b68d355bc6db072878d2fade6223c8e5a7280e485ec3879ad609670f571ddb72b57ca053493987c85b6666d09e7be

    • memory/1204-18-0x0000000002D10000-0x0000000002D11000-memory.dmp

      Filesize

      4KB

    • memory/2248-13-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2820-241-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB