Analysis

  • max time kernel
    111s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-04-2023 06:57

General

  • Target

    FedExInvoice013.exe

  • Size

    877KB

  • MD5

    c2744c4bab87079337e5040cec0c202c

  • SHA1

    f9a492ebcd8647eb373e889329a12bc69beca10d

  • SHA256

    0663257fdd4fc2ee70895f2d46ed462472c2eb8734bd191ab37df92555276bc3

  • SHA512

    b4500903b5d30bdd558f241ac31d2405a966ef3b6444674b3b35d01741402ce08a55deeed0bbd85bbe673491a4d4ce4e7b30608e19f008b309ebc91b448ceabf

  • SSDEEP

    12288:OqxiRq8Wzhy7/G5F4MkyzlvMjSp2O28Bu7O1mwlF6jiFOhG4q3N4X5Krg:3iRKhy7/G5GMxt67/m6uJMr

Malware Config

Signatures

  • PredatorStealer

    Predator is a modular stealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe
    "C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe
      "C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"
      2⤵
      • Checks computer location settings
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\Zip.exe
        "C:\Users\Admin\AppData\Local\Temp\Zip.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FedExInvoice013.exe.log

    Filesize

    1KB

    MD5

    765cff098b629b1eb49e3ef981f7001a

    SHA1

    32b7ade1f746d013371141dcebd96e0bb3faeef3

    SHA256

    ee17be860e129795491b4be61f5ac446b16f2679e056114024ffc72b2e23a9b7

    SHA512

    ca2d2ddafc2dcbeab2c93f039bdbc567d4c9e0457e741e71c432b7461a1a8165891f22112ff1b57004ba51271899555fbf001db17d2dc748bafc608817bd9474

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\ProgramList.txt

    Filesize

    1KB

    MD5

    a0069f5e66bee104f0f4f13da873e0d1

    SHA1

    54120eea530d99c973f650d9aaa01dd0925cb20a

    SHA256

    bdb1213fe1648ef523383b19fb81212395578aec6e19fc32811632788b2b1078

    SHA512

    9eab7970525d5eca04e78b576813ea06312c052f247bdc2570b94a6046fb4fc8dac63e793c4448617c726836b81d8fa825191d2d18fe872373af6282a3ee6c43

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\ProsessList.txt

    Filesize

    1KB

    MD5

    d0b701ad8a92ccfebbbf4ee321d810fe

    SHA1

    44b1ac361ca18016b46c99c9a615b916aa2d8fd7

    SHA256

    d357ae7cdf53635c6b9f40e62895b8f58e63cc1ff876d4f332d6c9ff00039337

    SHA512

    753f513b04de904972d8791385b6a7110f8ba137f0159166d42c93240bfe343e3186dd0af0208fcc2a061ea1b5c695cfe32b0e437ba632bbecf6192bae9d9f36

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\Screenshot.png

    Filesize

    426KB

    MD5

    44691a4a4acf4f8315dc780b8e153b22

    SHA1

    6851083ec72368a58fbcd557452737e6afa88d9e

    SHA256

    40f269887fd700c60f16fb8d3fb3d89e85eed517f2e8619a2451beb27bde2536

    SHA512

    6eff82b31baa91cac48981aaf618a826865a7e3da264437e77f3eade570ca2f234749972475ad7b664ae118ec1fc1ea6186af8c20d9894c0227616e8770ba1d0

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\info.txt

    Filesize

    315B

    MD5

    3ecd291b935f32ae607a1b1d78c14376

    SHA1

    98532a17cfa797ea69053d7b60b86609da3bab6f

    SHA256

    741601c1c94c6424a3b987178e115bc017bdf24f20195d68c9e560cfc5e07ba1

    SHA512

    8672e2ae775c490060ac9f6e9d1f5199027cb0b61ef959a113d3e0e1863410ec3f5682d47ab6d0247f65f2caac22a657a5c6adc22535205a0c73c064f2379301

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    af07e88ec22cc90cebfda29517f101b9

    SHA1

    a9e6f4ae24abf76966d7db03af9c802e83760143

    SHA256

    1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

    SHA512

    b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    af07e88ec22cc90cebfda29517f101b9

    SHA1

    a9e6f4ae24abf76966d7db03af9c802e83760143

    SHA256

    1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

    SHA512

    b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    af07e88ec22cc90cebfda29517f101b9

    SHA1

    a9e6f4ae24abf76966d7db03af9c802e83760143

    SHA256

    1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

    SHA512

    b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

  • memory/2288-138-0x0000000005AF0000-0x0000000005C96000-memory.dmp

    Filesize

    1.6MB

  • memory/2288-139-0x0000000005170000-0x0000000005180000-memory.dmp

    Filesize

    64KB

  • memory/2288-140-0x0000000006FF0000-0x000000000708C000-memory.dmp

    Filesize

    624KB

  • memory/2288-137-0x0000000005000000-0x000000000500A000-memory.dmp

    Filesize

    40KB

  • memory/2288-136-0x0000000005170000-0x0000000005180000-memory.dmp

    Filesize

    64KB

  • memory/2288-135-0x0000000005030000-0x00000000050C2000-memory.dmp

    Filesize

    584KB

  • memory/2288-134-0x0000000005540000-0x0000000005AE4000-memory.dmp

    Filesize

    5.6MB

  • memory/2288-133-0x0000000000560000-0x0000000000642000-memory.dmp

    Filesize

    904KB

  • memory/2464-169-0x0000022CB7020000-0x0000022CB7548000-memory.dmp

    Filesize

    5.2MB

  • memory/2464-170-0x0000022CB65A0000-0x0000022CB65B0000-memory.dmp

    Filesize

    64KB

  • memory/2464-173-0x0000022C9D130000-0x0000022C9D142000-memory.dmp

    Filesize

    72KB

  • memory/2464-167-0x0000022C9B3A0000-0x0000022C9B3B0000-memory.dmp

    Filesize

    64KB

  • memory/2464-168-0x0000022CB6920000-0x0000022CB6AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/2464-172-0x0000022C9B820000-0x0000022C9B82A000-memory.dmp

    Filesize

    40KB

  • memory/4796-171-0x0000000005860000-0x0000000005870000-memory.dmp

    Filesize

    64KB

  • memory/4796-149-0x0000000005860000-0x0000000005870000-memory.dmp

    Filesize

    64KB

  • memory/4796-147-0x0000000005860000-0x0000000005870000-memory.dmp

    Filesize

    64KB

  • memory/4796-148-0x0000000006D60000-0x0000000006DC6000-memory.dmp

    Filesize

    408KB

  • memory/4796-146-0x0000000007030000-0x000000000755C000-memory.dmp

    Filesize

    5.2MB

  • memory/4796-145-0x00000000061B0000-0x0000000006372000-memory.dmp

    Filesize

    1.8MB

  • memory/4796-144-0x00000000057E0000-0x0000000005836000-memory.dmp

    Filesize

    344KB

  • memory/4796-141-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/4796-179-0x0000000005860000-0x0000000005870000-memory.dmp

    Filesize

    64KB