Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 04:37

General

  • Target

    f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe

  • Size

    1.9MB

  • MD5

    ac02bdf47c1bf332ec1c128eb5bf1daa

  • SHA1

    d98389f89d70e0a52af0c694cbcc0521cf62f4ef

  • SHA256

    f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9

  • SHA512

    cdf678061bfb17f344d9ad914f9278e3bbaf04a3bf80c8fc9f53225bf8e005729850096fa8f9fd425b3d2d40fe46543843e883b2039691cb6ee1fde9323198e3

  • SSDEEP

    49152:CsonjgfeMymYptKbmjzktSI5JUT42+JQPvj1/cEZF3:g5MymYGfG4vkvjJ3

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
    "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
      "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
        "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
        3⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4512
        • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
          "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
          4⤵
            PID:4332
        • C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe
          "C:\Users\Admin\AppData\Local\Temp\f461d21b1b802ad18251457fb3e7318d1ce08ce08e5382f927a97aa443f77bd9.exe"
          3⤵
            PID:4344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 1232
          2⤵
          • Program crash
          PID:1432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3160 -ip 3160
        1⤵
          PID:1652

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Credential Access

        Unsecured Credentials

        1
        T1552

        Credentials In Files

        1
        T1552.001

        Discovery

        Query Registry

        2
        T1012

        System Information Discovery

        3
        T1082

        Peripheral Device Discovery

        1
        T1120

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese action fucking sleeping (Liz).rar.exe
          Filesize

          1.6MB

          MD5

          93596e6ccbb07ba0a41d6740a77a4e58

          SHA1

          499071cf8f5a55ba8d536665eccadc1d1792b827

          SHA256

          b34ae454e812678fa9b9d82118c730744f8459bfb327605d83b0817e14b37a02

          SHA512

          cf3ea039c9f36dbec9d585157fd218b5271f9360b0aad5dbb34cf29f95cb454c36d5dae48877f3b77508b6eb6bf38c5823f47bb521579fe0a9bcf516d807948a