Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2025 04:34

General

  • Target

    8bc9a9222a5172414d76902c93f4f2bc0c54674e4ce36d86d2d323d3967a2877.exe

  • Size

    2.0MB

  • MD5

    9c5d8f8c8027ffd0e192d3a52c3c6251

  • SHA1

    bd9d8f48957c763e1b65f8b471f6d3e2b1e72389

  • SHA256

    8bc9a9222a5172414d76902c93f4f2bc0c54674e4ce36d86d2d323d3967a2877

  • SHA512

    60f289562124da3dcdf10ed07495f7ebf22ad03ce974a943c5c367cc93e8a5cbf9ee96a99b7507b44604ffb51d09253577870517c79a076b13610ff0b43b80c2

  • SSDEEP

    24576:5E/GLp9oBlo/riutgO/oRDA834n45wh9vy+Ln0Zn7:RQB6/1tgO/Gjo4Gzny

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bc9a9222a5172414d76902c93f4f2bc0c54674e4ce36d86d2d323d3967a2877.exe
    "C:\Users\Admin\AppData\Local\Temp\8bc9a9222a5172414d76902c93f4f2bc0c54674e4ce36d86d2d323d3967a2877.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c expand Fits.mdb Fits.mdb.bat & Fits.mdb.bat
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\SysWOW64\expand.exe
        expand Fits.mdb Fits.mdb.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2556
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2108
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2060
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2260
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 824558
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2288
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Sections.mdb
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Elementary" Absolutely
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 824558\Josh.com + Entity + Clean + Veteran + Urban + Romance + Sofa + Sweden + Envelope + Forwarding 824558\Josh.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Schedule.mdb + ..\Angeles.mdb + ..\Hat.mdb + ..\Acid.mdb + ..\Towards.mdb + ..\Fancy.mdb + ..\Sms.mdb b
        3⤵
        • System Location Discovery: System Language Discovery
        PID:684
      • C:\Users\Admin\AppData\Local\Temp\824558\Josh.com
        Josh.com b
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1796
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\824558\Josh.com

    Filesize

    1KB

    MD5

    456c629d61cd1129327f1e80ca223f95

    SHA1

    2738d983149c0e1e29de0a411e9ba05e9bca3ffe

    SHA256

    6cde73091214df000ff3613bb2693e771d2a4cbfd564f9247fe04c4f1ca01e32

    SHA512

    03f1ae32e3570b964fa260afeecd2cc17c6c0cf9e329ae0238c6d34dd43efadb9595e8d40c8396e4c022ba101c581976d785a0b9b3a2cb4cfc06749cc40c73d4

  • C:\Users\Admin\AppData\Local\Temp\824558\b

    Filesize

    486KB

    MD5

    175f3fa6906e9a31bd87430f5c0e086c

    SHA1

    b0f9db92dc6b3fffe6492bf2cd9e013a2950c367

    SHA256

    7bfd3818d6aa08e88923ded7803eb3f9ef16d9ed9aeb89262f1ad68fb69c585f

    SHA512

    315f23f3792a30bd802e79f7eca1764a12adb423ead0073e84167bdb35ba915fd5fefaec85acff5aba59975d232bf84eb352fb6021de89cef3a4be56ffb20603

  • C:\Users\Admin\AppData\Local\Temp\Absolutely

    Filesize

    1KB

    MD5

    0e39b468c9f1c638abc42cd084afe4bb

    SHA1

    e1922778729df30d63560faff0f3796fd88f521b

    SHA256

    e5e9f5212e84191d8cc6ac77a1c988bb5702ad12b53117c9a90c967ce77f225d

    SHA512

    cd770d51007a13590fbb2d870428e67c611e9b77fbb8aa7a572c61a93071670c3bd39b2c05ff083fef39533872fa072c604515d9fd1c0e9ec92647fbbca26224

  • C:\Users\Admin\AppData\Local\Temp\Acid.mdb

    Filesize

    56KB

    MD5

    be91fbd14284d60554d14260f8ef6a76

    SHA1

    4024e906dc20d236e91cbcd3de489763cef1a20c

    SHA256

    be04a6e91f763f9feb8a66fe601bcb2e7f9de2f7ec35ae811b1bb5c1cc5a0158

    SHA512

    70c27a921870adf02b6f992aaeeaf7d7dde78427b042fd7140879a56f6b3141d42411754f98110e24ef400bfdfb7907ef79c504857f9631339c4f53eeb9a4724

  • C:\Users\Admin\AppData\Local\Temp\Angeles.mdb

    Filesize

    82KB

    MD5

    f9b7dce4bd1e7107c7974e728b162f2f

    SHA1

    38aa15c62a89174567356d87ee0c949a86ccbad4

    SHA256

    74af7516d88e1c9b235a5573596e0f095dc5c091067886ba3be8e07c72e26b87

    SHA512

    8fb4c3a73f2874433d3646f06353ad3ce3583969c25735e99b9e2b4cb15ec9697fa903a141fa53f181ff36cd5d374bc016090860684b1598db839ab4381f37a4

  • C:\Users\Admin\AppData\Local\Temp\Clean

    Filesize

    121KB

    MD5

    9bd3c2ab1383777e5a5bf74b88688984

    SHA1

    3200c4041e67e52693bf0d59a5fe83afe416005d

    SHA256

    1da87ef5f82393e909f5a9b0932543150e43c840159cc6e594dbc92e25eec4f1

    SHA512

    3f49522fed94c415a1cc4f068f789a4260addd8dd7fe522815776eb84afa96126d702ae6c3556b45f791742205c8d72375917d0449d49446a2acba788771cfd6

  • C:\Users\Admin\AppData\Local\Temp\Entity

    Filesize

    130KB

    MD5

    b75d9cecb6ca7cc1c1e5463808b9a1ad

    SHA1

    ea6671f2c984d4f07dc1016de2923fdd8364aa23

    SHA256

    84e43ca6a1eaada600bcb8ae2f0166f4d571ad0359fb4fa11a140b39c0f13850

    SHA512

    be117068495a3ef6c7f99a78127ae9fbeff74eebf9a7e45ff3bbe87c5c7d7b0b3266202a40d4d62d72ff6e80893db8b8248acef9b8d55dbf3efcd3b86dad6cd0

  • C:\Users\Admin\AppData\Local\Temp\Envelope

    Filesize

    94KB

    MD5

    5bd8992cc5365fd6e3b3ac08d77dfe85

    SHA1

    355e18d9395c6357050019ec24822391a5996479

    SHA256

    201c16268546ad7d7bf76bf67e955eb052efe872bef6e7f1949f1dcf1c92aac1

    SHA512

    bf84504b8813ad4c3827687367bea7734b143a046b93048fbf73f23389081128b1dc459e0f34fa3e7b9bb2efa60200b967672a337c9ed3360f844b809e93a15c

  • C:\Users\Admin\AppData\Local\Temp\Fancy.mdb

    Filesize

    72KB

    MD5

    dc1239db201d16661b1074c7696d061b

    SHA1

    02dbcbc38a5a559a725be452b0f5c653ba56e20a

    SHA256

    5e809d7277cb405fc12573cc5578a5120a735c38ec7bb2d504f40e2f535aefbf

    SHA512

    286ba1288c705a46c5f0644b5cd3a20582d04ad31c1529679756c8fa3ffd41e829286ada5234cd403862afd746c13f27a75437c0f1e9a152eeb28112f5b0845e

  • C:\Users\Admin\AppData\Local\Temp\Forwarding

    Filesize

    108KB

    MD5

    69a16179816e8b46113eaf36f05430f2

    SHA1

    0d7882ced557b26f400f4e3ce4ff239825a8bb89

    SHA256

    f8deb5fb941f5f4a3f0eb524a7078c239ae6768789e6c8456ad122b58c76d4d2

    SHA512

    0b2c7c36fc17ca5ec43a682333d9d989d59032c4c865705984c5e223e2af0e65e0e1c73da90256ccec761dd15bcfb38ba9fb4f82c150a6e0c1d3467d7f6c9ab9

  • C:\Users\Admin\AppData\Local\Temp\Hat.mdb

    Filesize

    94KB

    MD5

    e51b482c701be0eaee860034ecdf199f

    SHA1

    c43cf8c1c66d7a75defa8036260ff8a3285a4974

    SHA256

    f410bd9547debb2d438f53be7bd8cf2316c4b2c94f3c93545d1c33f9de4d4433

    SHA512

    96005adce3a0c670ad6ce7e8fa5337b6f8f4a4c2f1c637011bbc8ed3ad7def790c46d2a6bdd35175ba8c0fe8b224ce250e8d807b0ac87b9aba1610b993d51a32

  • C:\Users\Admin\AppData\Local\Temp\Romance

    Filesize

    85KB

    MD5

    3238afb4261a5ad72851ee292b54876d

    SHA1

    886d0c37534bfb26bc203c54337e1f6d22f0bb97

    SHA256

    179b0b52eeb8f958ee646cc73d4299d483e16f3cc1c592370b9c31e4ffab185f

    SHA512

    d9edae3809bab64b146fff48a17b01cab9a7a318e37906f49acead06ce6b9da3a29abbd7270ce5171e40968f8a55d51f5525ce671c4cee502cf962f7f4f813e1

  • C:\Users\Admin\AppData\Local\Temp\Schedule.mdb

    Filesize

    61KB

    MD5

    1b0e805a7a2bf6284aa6a2b4a29ca758

    SHA1

    4c5ad77264b71e22d63da8c495d1ab69b44b4a45

    SHA256

    53bf562e53aec52a5b0a0925ce4ee247a72dcc9cf0fd104cbf5e63e783302c8f

    SHA512

    3bcb63de870bad12e08df4066143b485608377eb71d5f24e160adaba09c7e8852a2605503a107ed12014d22faa3e2be26f6930382fc64ff4bcc77fb00ef411af

  • C:\Users\Admin\AppData\Local\Temp\Sections.mdb

    Filesize

    476KB

    MD5

    aa8c70db358f4738d2dda8e6bb96af38

    SHA1

    bf134ef916df96e84edd50187a0f4f74b20435b7

    SHA256

    2f8e857eb64384500361c515bd175903c1a6b8135a339d7826e34ffa4c7589d4

    SHA512

    ffa2e5036d40e2721fa1e98b01bb254f544312ab87eb55144d8608c8d194eadd8bdcca018003c0c4a1d9da0a74f9e2b1ad9dd542a84b11e19b03d0102cd93ebf

  • C:\Users\Admin\AppData\Local\Temp\Sms.mdb

    Filesize

    33KB

    MD5

    66fec3716fc37f94b5dc52ebaa494067

    SHA1

    1330e67b5445a64c698d7f119000f545e1ef8643

    SHA256

    42d5346367338006a4c8e94e3b39c1cc0aaae9fd92744bf6e6aa698515de650e

    SHA512

    9a7a08726970510d708097ed27741e4f598696a7fecf3ef011d59740418fdf23a6cb1ce638062e7ece00e687530acd0c0ff6b5f89cf1043b325970c789d6d39d

  • C:\Users\Admin\AppData\Local\Temp\Sofa

    Filesize

    104KB

    MD5

    9ff7029bb323eb86d643d488c904c36e

    SHA1

    8f95267c695d193a33447faad01cefb465c9c6dd

    SHA256

    419a206560e3ae4a2aae4b330b7cdba85d265c242fa40e9808caff436bb5c263

    SHA512

    ddc9323521432954b394a0d91261534e8ab51fc5035b9db85eefcf37cb2766c9948724e08abe57e3c333efc5a26a825d1be031cbc7957605e338fb8b8313fce6

  • C:\Users\Admin\AppData\Local\Temp\Sweden

    Filesize

    76KB

    MD5

    eacfe2d1caeaa3e0a53ae2a13bc26664

    SHA1

    5c36a38ca9a1ded836a174b9c2b781f9f60e2c25

    SHA256

    525d5cdbeb0751ba7be32aeb798a7b0a3fdb9672c7042976ce8c9f8c8ef0733b

    SHA512

    e978a04af199cc9f5ecf7a10be57287a5f5f2003eb720de0e6751404fca3ad165e5bd51edbb19b229060b355705707b91a886b844919da88b7b4558728422185

  • C:\Users\Admin\AppData\Local\Temp\Towards.mdb

    Filesize

    88KB

    MD5

    066ac839f379d6437d72774f2a9b4244

    SHA1

    c64379c31b454355cd6a8ab1547b9c67b1986033

    SHA256

    329e1b1d320a0fc6d8cee0c98efe800a16d862984c486eb4e31011f0b7218ca3

    SHA512

    cb24d0bcb2d11a79714c732a21ec7021017f5031c60de9dd997e03dcb050c1d70ca7b5321f1cbf2d10ddd49038b7c0dbd2eebd825aad7d3cf9c510c141503f84

  • C:\Users\Admin\AppData\Local\Temp\Urban

    Filesize

    131KB

    MD5

    f8b706ba0fdb336b4cc9bc7bb43848f6

    SHA1

    f3559b1717b40e3f218712bb1feebf13a13d4a01

    SHA256

    433d8d90441d0225b14de9023528afe68e42e8683bd051a8b08eb4b4e56156e9

    SHA512

    8bb2833f1c471c1e2d9fc5cf7c1fe755ab229fa01d4a22e520bc6e4b718f93d00672b78cb873266bb3dde3aae96561c319b990a775f7a740f3715acd39f4468b

  • C:\Users\Admin\AppData\Local\Temp\Veteran

    Filesize

    74KB

    MD5

    5325dbafe4356f21185fda498c282bd9

    SHA1

    67022e2bed0595bf0f1d1213a6a98b3a5bc0b959

    SHA256

    d7ed674d56671fd27426ad8f4795a983c0c1f1efbc821281441a12154d026a30

    SHA512

    267d0d82e98927340310177e4f4c0d33e217d7448af9bd58064ca5b60e13b4da5429d9f1454611a03637097c9e6253dac765f1f486ddad5f08798028c9c28a8d

  • C:\Users\Admin\AppData\Local\Temp\fits.mdb

    Filesize

    16KB

    MD5

    884fa01a43c80956e144311bd6a548fd

    SHA1

    ab5b662d73ae049542deb1ed74a221fd66380189

    SHA256

    ce3da2c5d12cad2af67bb6f0cd2699be616720bef985210a40f6a323ce1be2e8

    SHA512

    05458e8721e335d22b2346feb7626f007e291921c6059d02cb30c0ef58e091d706ce169620f44a6aaf7a990e5f1b927c92b1f91b21d5f07daad07c468c5ad57a

  • \Users\Admin\AppData\Local\Temp\824558\Josh.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1796-69-0x0000000003650000-0x00000000036AB000-memory.dmp

    Filesize

    364KB

  • memory/1796-70-0x0000000003650000-0x00000000036AB000-memory.dmp

    Filesize

    364KB

  • memory/1796-71-0x0000000003650000-0x00000000036AB000-memory.dmp

    Filesize

    364KB

  • memory/1796-73-0x0000000003650000-0x00000000036AB000-memory.dmp

    Filesize

    364KB

  • memory/1796-72-0x0000000003650000-0x00000000036AB000-memory.dmp

    Filesize

    364KB