Analysis

  • max time kernel
    134s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2023 07:54

General

  • Target

    File.exe

  • Size

    655.0MB

  • MD5

    4eb9b0f0903b77be9247978ffbc8814f

  • SHA1

    ea21fa7fd9a430a899a67136b6f864bbd6ea74b9

  • SHA256

    ba88907898f51ddf30595e773cd5de0f28020ad70af49e530c89b20501bc0f94

  • SHA512

    fec3dec02889784e2aa6e82f64f85e397ce44812287312809081e299aca960ac03cc23dbccc43e72c621a05b80de1a6bbce04003d0538708e9a45fe5d74e8a1f

  • SSDEEP

    98304:Jkfy48U0RHYuMH+F4mMURdns7gefj/vIeZuNYq8CIF+k/SL7IwXdz:Jka4t0/s7gefrvENhuwaSYU

Malware Config

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\File.exe
    "C:\Users\Admin\AppData\Local\Temp\File.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:412
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:1488
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:4808

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/412-134-0x0000000000400000-0x0000000000EB6000-memory.dmp
        Filesize

        10.7MB

      • memory/412-136-0x0000000000400000-0x0000000000EB6000-memory.dmp
        Filesize

        10.7MB

      • memory/412-146-0x0000000000400000-0x0000000000EB6000-memory.dmp
        Filesize

        10.7MB

      • memory/412-157-0x0000000000400000-0x0000000000EB6000-memory.dmp
        Filesize

        10.7MB