Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:37

General

  • Target

    f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe

  • Size

    1.9MB

  • MD5

    ac02bdf47c1bf332ec1c128eb5bf1daa

  • SHA1

    d98389f89d70e0a52af0c694cbcc0521cf62f4ef

  • SHA256

    f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9

  • SHA512

    cdf678061bfb17f344d9ad914f9278e3bbaf04a3bf80c8fc9f53225bf8e005729850096fa8f9fd425b3d2d40fe46543843e883b2039691cb6ee1fde9323198e3

  • SSDEEP

    49152:CsonjgfeMymYptKbmjzktSI5JUT42+JQPvj1/cEZF3:g5MymYGfG4vkvjJ3

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
    "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
      "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
        "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3000
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 384
      2⤵
      • Program crash
      PID:1032

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\danish lesbian [milf] (Sarah,Sandy).rar.exe
    Filesize

    1.8MB

    MD5

    c9a61f62eed0344bc7f2fb6884263c85

    SHA1

    7909c8eaaa8a16b55274e8fb7fe64faaf8dc68c8

    SHA256

    4a4bfc90f17c73ec2de213213178114123f5c782dbdd358d222c44a80967b85a

    SHA512

    c9d6f19dff8cc835c886c2099abbe32caea3a7f1508bdbbf1b492341d66c88a6a4ba0765f830a78ed346916fbca974e6eb160e1ca8dc071e26a60ed6f5fb2e80

  • C:\debug.txt
    Filesize

    183B

    MD5

    2cd2ba557f6b98eb8969af21e2dba787

    SHA1

    af58b602d6f941bbb120d781637eafab8f19f110

    SHA256

    aec61aaccda01ea9a43cae1de7558cd9fe25624597002a46483315ee86e58d51

    SHA512

    19c4ceb0ccc418953fe75e27baa8489f77eb1a569aa3a530e8fcb2668b2c94004b9dca891d959786b6cbab413e94add15ed29b939468782aad76d8f8d0800157