Analysis

  • max time kernel
    1s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 02:19

General

  • Target

    c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe

  • Size

    623KB

  • MD5

    2abf09941db488f850f1783e882284c3

  • SHA1

    45e3a08a7904dbe4c1da8f771d65ca72d8639494

  • SHA256

    c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970

  • SHA512

    7ba11d461ea89550acf92ec2f1c89c986b0a08c94c09a1c444db9056f739d017b7dd6bb1f16fda48ceb3340647e0caf57fd1cea6698ed1d358e103bb081e42b8

  • SSDEEP

    12288:lEQoSfqaDJYMCQEqO5XJP1wCqt9bKuHLfVNJUhiXhJhG3tF8nW8s0LE:l4lQ9sgxdfVNgiXhDZnW8bE

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 3 IoCs
  • UPX dump on OEP (original entry point) 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe
    "C:\Users\Admin\AppData\Local\Temp\c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe
      "C:\Users\Admin\AppData\Local\Temp\c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe"
      2⤵
        PID:2784
        • C:\Users\Admin\AppData\Local\Temp\c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe
          "C:\Users\Admin\AppData\Local\Temp\c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe"
          3⤵
            PID:1880

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Windows Sidebar\Shared Gadgets\italian hardcore voyeur .rar.exe
        Filesize

        1.1MB

        MD5

        adb02e0435dbab2020d67c2b874874c2

        SHA1

        2b01bdd675736f3dca7dca7747ae6206ea3dd708

        SHA256

        08ea341d4dede9df2c38b4f4523997e56b24c7a3e5da1463b03afbed69c68a51

        SHA512

        de93a6ca57f99a689dbfc556413cf18d362b12b18589b41729d9238f76258abe772668a40c0e78df4cfa0e00a0bb6f56e07800a29091da77dc19b646ddfe055a

      • memory/1368-0-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1368-64-0x0000000004C10000-0x0000000004C66000-memory.dmp
        Filesize

        344KB

      • memory/1368-107-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1368-109-0x0000000004C10000-0x0000000004C66000-memory.dmp
        Filesize

        344KB

      • memory/1880-91-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1880-111-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/2784-65-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/2784-90-0x0000000004E50000-0x0000000004EA6000-memory.dmp
        Filesize

        344KB