Analysis

  • max time kernel
    206s
  • max time network
    239s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 06:22

General

  • Target

    5125698974e08a13396bc77aa7113e3d45360f723596ca3ec88838bb08359c82.exe

  • Size

    675KB

  • MD5

    f18185c1617ef70a6298e02ec286b11b

  • SHA1

    fde9f897241c40ea80540393370e5c730dd5a660

  • SHA256

    5125698974e08a13396bc77aa7113e3d45360f723596ca3ec88838bb08359c82

  • SHA512

    7223d406b66b90ea1b105aeb6a0cec08270df00d5be282387aef65eda2d914bf5ca2d3236dfac40d68e5a328e4df9fb2e2ea0ee7b1483d8a932e861a267de33c

  • SSDEEP

    12288:HqlMhfymUyZzk8ri+hcGgn9cJBJYGahyHY2oSj97E6zUaCFBhCb0p:H5kxyZFe+hcGEXGwiY2jK5aS

Malware Config

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/sauydga27/

Signatures

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5125698974e08a13396bc77aa7113e3d45360f723596ca3ec88838bb08359c82.exe
    "C:\Users\Admin\AppData\Local\Temp\5125698974e08a13396bc77aa7113e3d45360f723596ca3ec88838bb08359c82.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im chrome.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3492
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im chrome.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1cb34f50,0x7ffa1cb34f60,0x7ffa1cb34f70
        3⤵
          PID:3396

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2728-135-0x0000000000000000-mapping.dmp
    • memory/3492-134-0x0000000000000000-mapping.dmp
    • memory/3548-132-0x0000000000400000-0x000000000058E000-memory.dmp
      Filesize

      1.6MB

    • memory/3548-133-0x0000000000400000-0x000000000058E000-memory.dmp
      Filesize

      1.6MB