Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2023 13:37

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.23246.19502.exe

  • Size

    620KB

  • MD5

    e36ce22684d90063256005787dc6f20b

  • SHA1

    bc7647d15e52e72bf36fda20e782965a2e7e47ba

  • SHA256

    edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa

  • SHA512

    e779725bb997951150788f81e10ebffa64bc406b519b78dda612955e597ca602b6fd0bfa471fe5abf35e585af5d9c92c6c593958d941c354dd5a5011e490bdb6

  • SSDEEP

    12288:D8t1GmK3ENAdy1YWEt3IRiRwxahJCKxXoRwh3CX7wBO09yrxR+tmtR:D8vGz3EACLEtMEDxVoR0SMwjTR

Malware Config

Extracted

Family

predatorstealer

C2

http://www.biopharmzpharma.com/Maxwhite/

Signatures

  • PredatorStealer

    Predator is a modular stealer written in C#.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23246.19502.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23246.19502.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Users\Admin\AppData\Local\Temp\13.dll
      C:\Users\Admin\AppData\Local\Temp\13.dll
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Local\Temp\Zip.exe
        "C:\Users\Admin\AppData\Local\Temp\Zip.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\13.dll

    Filesize

    550KB

    MD5

    9dfbed115f029f3501c48806564ec04a

    SHA1

    cf6538e6d6eec51bab88da3963260b9204158e12

    SHA256

    09780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977

    SHA512

    c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1

  • C:\Users\Admin\AppData\Local\Temp\13.dll

    Filesize

    550KB

    MD5

    9dfbed115f029f3501c48806564ec04a

    SHA1

    cf6538e6d6eec51bab88da3963260b9204158e12

    SHA256

    09780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977

    SHA512

    c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672.zip

    Filesize

    876KB

    MD5

    52bdd1cbd8de7b7d87b80487bc306774

    SHA1

    098ea6596b34cc12a2f2b29301b2072e15fad250

    SHA256

    740e5620fe5f0323f9d66fd7e0d5c28296cdb1adf849dbf219d898564814cd86

    SHA512

    d610f304e7233ac75d064413e40fab81ca0401305453bdd120272c4afef72aa72a3cb8753a3c72b6ac54fb0ed28e75b677fff70c6a3698fd1f380975777499cf

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\InstallUse.ini

    Filesize

    449KB

    MD5

    c9289b294d94629133e03dae2ed8ae04

    SHA1

    fc9fddb0523665680bf9307f3bb25aacd9c786a1

    SHA256

    200886c237e8bea4c89bfe43b80203136a12f450cc7e7d558ab0c6d7ac0f24c1

    SHA512

    5bc995bd1f092ac88c22bd545aba448c6f2a85268f1735ede3c110c791cdac86249e4637a34afd5435074720115c82ea92c43775f523c7924665cdd066fb8342

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini

    Filesize

    282B

    MD5

    9e36cc3537ee9ee1e3b10fa4e761045b

    SHA1

    7726f55012e1e26cc762c9982e7c6c54ca7bb303

    SHA256

    4b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026

    SHA512

    5f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\ProgramList.txt

    Filesize

    1KB

    MD5

    2554617f5ea5199193845737e7e7d8f7

    SHA1

    f554ce7419f1f4c1696d6b8d8288791ac85b1aa2

    SHA256

    dad01264f26c2236215a3e45b92fe83fb08e3406b1b121958d0e9c3df4c0ae34

    SHA512

    7444900f9a771bec90f7478714581bce47fe2b398c73ce1b5cc442dc123494388b7d79892955bec1bfcebec05a4562cc4522ededecfa99218990878f9ffc3898

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\ProsessList.txt

    Filesize

    1KB

    MD5

    60a8c2feab65bfc1ef6406cfa2d7ba9b

    SHA1

    eab531bb8c948977af9f00c5136b252c3fcfd288

    SHA256

    3ed3eb3ff2591f8722c83de908a49320ba18328317e318cd9293b85fea3f431f

    SHA512

    1fa30b676430777095ee31a0242a61310b3ae3bc919403f0b5c43c8422854da980c4501d6f437c3d48922defd3e919f66afe26d5173ae5981f7781db7a4de986

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Screenshot.png

    Filesize

    427KB

    MD5

    03a72bce89c86b9be1686b6f76d51096

    SHA1

    ef97da93db29cac1ce597affbc85e285cfee9468

    SHA256

    d1c6943ea9a5036516a5a36d8458a41543245725e291d8fce7b286e1587690be

    SHA512

    5c8002bd4122f7dd0ed4fc3b743959d4b6ced6db39486a080f773f967f0174eb2873bd74ce5cdfc89f0726813af676c4dd7af67fb105b8089eacaef27bea5c66

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\info.txt

    Filesize

    315B

    MD5

    32728bda9dbec43b612d1932884b2084

    SHA1

    4dd2ff510c88ffa23be5d2b1548afab60b83d990

    SHA256

    93c467d3f7eca33115c403e1b9c9eea4172acb27fe58d4dd0d11e3ea1511258f

    SHA512

    d85fb64b38e0b808b952d99dc476e987c86b0cc75e9bdb6c79de5223cfe6a8d4abbb004aa7cecabcbac1ef76f8ea4a71e38a6e7abd1f93c107a4f68171e9cddf

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • memory/2676-167-0x00007FFB6FE20000-0x00007FFB708E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2676-180-0x00007FFB6FE20000-0x00007FFB708E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2676-166-0x0000025808FA0000-0x0000025808FB0000-memory.dmp

    Filesize

    64KB

  • memory/2676-171-0x00000258236E0000-0x00000258236F2000-memory.dmp

    Filesize

    72KB

  • memory/2676-170-0x000002580AC90000-0x000002580AC9A000-memory.dmp

    Filesize

    40KB

  • memory/2868-169-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2868-168-0x000000001BD50000-0x000000001BDEA000-memory.dmp

    Filesize

    616KB

  • memory/2868-150-0x00007FFB6FE20000-0x00007FFB708E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2868-144-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2868-143-0x000000001BF80000-0x000000001C4A8000-memory.dmp

    Filesize

    5.2MB

  • memory/2868-142-0x000000001B080000-0x000000001B242000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-141-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2868-140-0x00007FFB6FE20000-0x00007FFB708E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2868-155-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2868-181-0x000000001BD50000-0x000000001BDEA000-memory.dmp

    Filesize

    616KB

  • memory/2868-182-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2868-139-0x0000000000130000-0x00000000001C0000-memory.dmp

    Filesize

    576KB