Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2023 13:40

General

  • Target

    0x000f00000001201d-56.exe

  • Size

    550KB

  • MD5

    9dfbed115f029f3501c48806564ec04a

  • SHA1

    cf6538e6d6eec51bab88da3963260b9204158e12

  • SHA256

    09780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977

  • SHA512

    c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1

  • SSDEEP

    6144:s+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWYhJ6usHJdJUt:XPw2PjCLe3a6Q70zbpJOHit

Malware Config

Signatures

  • PredatorStealer

    Predator is a modular stealer written in C#.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\Zip.exe
      "C:\Users\Admin\AppData\Local\Temp\Zip.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672.zip

    Filesize

    428KB

    MD5

    9986906ac8e4224edd12562a588cbed0

    SHA1

    e2bb61364af2f89d89cb4f2f7fa4f042a504bb2c

    SHA256

    b66200d4f07c2d3f3c503edfa562b0b367271c09d31e34e90f3705c970f38517

    SHA512

    48fa3093d949d9fce2365d85fe8c83e1c5288e4baa3e590686512c4c805d1fd5671e672603475eddd031a16d05e95361b4a3811d76f76c5b5a72b742b7cd8899

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini

    Filesize

    282B

    MD5

    9e36cc3537ee9ee1e3b10fa4e761045b

    SHA1

    7726f55012e1e26cc762c9982e7c6c54ca7bb303

    SHA256

    4b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026

    SHA512

    5f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\ProgramList.txt

    Filesize

    1KB

    MD5

    2554617f5ea5199193845737e7e7d8f7

    SHA1

    f554ce7419f1f4c1696d6b8d8288791ac85b1aa2

    SHA256

    dad01264f26c2236215a3e45b92fe83fb08e3406b1b121958d0e9c3df4c0ae34

    SHA512

    7444900f9a771bec90f7478714581bce47fe2b398c73ce1b5cc442dc123494388b7d79892955bec1bfcebec05a4562cc4522ededecfa99218990878f9ffc3898

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\ProsessList.txt

    Filesize

    1KB

    MD5

    b2c6330994f266fba5700478f49519f0

    SHA1

    5b600ca4cea5eaa19da91f5576e4c34ebdf3dd43

    SHA256

    cf88f98e44fcc22426cd4fcf327ccc8d753e455a8bdc50062bb6fb144b8b5f96

    SHA512

    d20024f304d7b1700d1704872d7ac942575c4a568f5f78883a263ba625ae2caa16b8ff43f484a1fa55effb1fdd9137e4a021e7a542851b177fe6fe2975829dd4

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Screenshot.png

    Filesize

    428KB

    MD5

    d128701801cbaac6a25281c9c4c20df8

    SHA1

    20444d216e10ea34a796ddf1b74a05c9df7885b0

    SHA256

    63f8a0c93ebfb6065f46333938d39251dcf2f524956bdb0f91ac749c7ce70657

    SHA512

    fbb9bfddda25449a9d9932987decca8fa9430de4aa628fd9d7cebc9575693ac6d179bee158dc23dd55911ca2bac4bf7f055228ed0320a35e69cb54ad48d3066b

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\info.txt

    Filesize

    315B

    MD5

    7624deda1e30ad16feb25b9b052cda3b

    SHA1

    35867a6260fbb937a41120b6156bcd0d712a9142

    SHA256

    e9bef3ee6273ee0888a1c5e6606d8bd5a0d1e4c1f133d8f682d6f0bf07296d73

    SHA512

    d11134d40f92ddaee4c3c78a7ee73aed39def0fb6f8da4c25e016f0f663dca562327edc4d37fee3a473545093e47e6679309ebac4169838065a5d4c275da3d2e

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • memory/2844-147-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/2844-138-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/2844-183-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/2844-179-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/2844-161-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/2844-162-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/2844-134-0x00007FFE48770000-0x00007FFE49231000-memory.dmp

    Filesize

    10.8MB

  • memory/2844-174-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/2844-143-0x00007FFE48770000-0x00007FFE49231000-memory.dmp

    Filesize

    10.8MB

  • memory/2844-133-0x0000000000280000-0x0000000000310000-memory.dmp

    Filesize

    576KB

  • memory/2844-137-0x000000001C1D0000-0x000000001C6F8000-memory.dmp

    Filesize

    5.2MB

  • memory/2844-136-0x000000001B3D0000-0x000000001B592000-memory.dmp

    Filesize

    1.8MB

  • memory/2844-135-0x000000001AFE0000-0x000000001AFF0000-memory.dmp

    Filesize

    64KB

  • memory/3796-171-0x000001E3D33A0000-0x000001E3D33B0000-memory.dmp

    Filesize

    64KB

  • memory/3796-173-0x00007FFE48770000-0x00007FFE49231000-memory.dmp

    Filesize

    10.8MB

  • memory/3796-164-0x000001E3ED950000-0x000001E3ED962000-memory.dmp

    Filesize

    72KB

  • memory/3796-163-0x000001E3ED920000-0x000001E3ED92A000-memory.dmp

    Filesize

    40KB

  • memory/3796-160-0x00007FFE48770000-0x00007FFE49231000-memory.dmp

    Filesize

    10.8MB

  • memory/3796-159-0x000001E3D2F40000-0x000001E3D2F50000-memory.dmp

    Filesize

    64KB