Analysis

  • max time kernel
    111s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 01:47

General

  • Target

    b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e.exe

  • Size

    1.4MB

  • MD5

    fd944ebaddcc4c513325f1b6f08d7fbb

  • SHA1

    01caa0888648b92e1724434803d4b5e6925a3185

  • SHA256

    b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e

  • SHA512

    ca0ae57fd4bb5eeb0172bdc9d2e14fe80e721e427d7e7110a1c2338defdacdf439e83f2291361869ae527dc4733aa619276c5b3abf0d77bbe823a65530191b7c

  • SSDEEP

    24576:2WxQe944sw2k3BlCK9XerDtsU2e4zE+7EKNFTfBZFKDKwJJVDxMuR90:zx1O1kPIfn+4K/FKuGVDSoi

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e.exe
    "C:\Users\Admin\AppData\Local\Temp\b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e.exe
      "C:\Users\Admin\AppData\Local\Temp\b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Users\Admin\AppData\Local\Temp\b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e.exe
        "C:\Users\Admin\AppData\Local\Temp\b6b4e03b8e345ba1acbfeef5de5e1da6b4735ef4c5ded75df4736efad54e365e.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3192

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\russian beastiality sperm public hole .mpeg.exe
    Filesize

    2.0MB

    MD5

    9be818436b5164fb056d90c48bfef39f

    SHA1

    3da215763565981330c2badc9609af897b17317b

    SHA256

    9ad345d58aaef9612a6edce0f1ecd2117ae42d64ae49f808772fe1be4eaa6bd0

    SHA512

    1f6a38ab034d5ec8584c1368e0eac3203a5a24cf39e05e65fa29fd6a02c41193098a8608121bf1680ed661c3675d997c5bf25067af11ed2981ecdde3709c861b

  • C:\debug.txt
    Filesize

    146B

    MD5

    359ef12fe952640602d1d1845b180d2c

    SHA1

    63f4029e9d2bc92f7d8e693b59c4419d0b14c907

    SHA256

    2fa02c0715bb03a510313aa5ac8db2b9d1fd7baf082c7d00eb65899edce03860

    SHA512

    db1ee969735c4343a23a986b3ca9dd957c7375954a7d72a21231859caebdfe6e80c4fde09a98928e5ec303faab6ed577d6ebac27868d0a0145bd1342f1c0b656