Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:27

General

  • Target

    da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7.exe

  • Size

    1.8MB

  • MD5

    e77d4b0c2c4675c1e8e7589fb195f1a8

  • SHA1

    bf689b569d4cd427e76462deced12465a08724e5

  • SHA256

    da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7

  • SHA512

    e86b043f50cfe3ffa4bc535fd90a27a75ee08463d35ea6bbe791335842c8298f6e6aa5d68b7fcc6ba8430438be219bc8078b3bfc198619a26b1dc8e85eafa5bd

  • SSDEEP

    49152:VVvHcjm2XthXr+JpSEBfz8leToZ7Ji+90GcC3lu77IB:TvHSbtR88e8PyGcC3A7UB

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7.exe
    "C:\Users\Admin\AppData\Local\Temp\da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7.exe
      "C:\Users\Admin\AppData\Local\Temp\da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Users\Admin\AppData\Local\Temp\da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7.exe
        "C:\Users\Admin\AppData\Local\Temp\da6794322173ed75d83002265cd1677e453d5c01999dee040ac3db21851a51e7.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2960

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\black trambling porn girls mistress .mpg.exe
    Filesize

    1.6MB

    MD5

    adcb7dc2fefcb17b2b92b3202725f824

    SHA1

    142a4fcca9d500a3a6afdc72b980c95e839a0c2a

    SHA256

    536e51786276838a1cae108b25e3e2ef3bfe5c96ad97d2b0aac2510a6dbecea0

    SHA512

    44dcaf56f5388cdcc64652235c2ca860e909803ff4f39f5273c647a81cf9c662207a190049bb4e541b6fb48bff30e090051d492d0c6c28f895ceca18f6b75e11

  • C:\debug.txt
    Filesize

    183B

    MD5

    9eec78a34348b7cbc2cc26b435594ea1

    SHA1

    4341e02799649a56acc8186dea2ff6c2b98f5912

    SHA256

    8a4a873c961fcbfb63195e75edfd72edd1fe42ae492892dcdc71f1fd69c7d0d7

    SHA512

    4ab7933286fa4e0d23038c7746543e0c225174cc950a7689d12802a773734fe1ba96bb59162a63e005105229d3df302150beac10d75abc66f6de0f86865f0144