Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2023 13:40
Behavioral task
behavioral1
Sample
0x000f00000001201d-56.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0x000f00000001201d-56.exe
Resource
win10v2004-20230703-en
General
-
Target
0x000f00000001201d-56.exe
-
Size
550KB
-
MD5
9dfbed115f029f3501c48806564ec04a
-
SHA1
cf6538e6d6eec51bab88da3963260b9204158e12
-
SHA256
09780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977
-
SHA512
c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1
-
SSDEEP
6144:s+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWYhJ6usHJdJUt:XPw2PjCLe3a6Q70zbpJOHit
Malware Config
Signatures
-
PredatorStealer
Predator is a modular stealer written in C#.
-
Executes dropped EXE 1 IoCs
pid Process 3796 Zip.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\update_231501.exe / start" 0x000f00000001201d-56.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini 0x000f00000001201d-56.exe File created C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini 0x000f00000001201d-56.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 0x000f00000001201d-56.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2844 0x000f00000001201d-56.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2844 0x000f00000001201d-56.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2844 0x000f00000001201d-56.exe Token: SeDebugPrivilege 3796 Zip.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2844 wrote to memory of 3796 2844 0x000f00000001201d-56.exe 88 PID 2844 wrote to memory of 3796 2844 0x000f00000001201d-56.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe"C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Zip.exe"C:\Users\Admin\AppData\Local\Temp\Zip.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD59986906ac8e4224edd12562a588cbed0
SHA1e2bb61364af2f89d89cb4f2f7fa4f042a504bb2c
SHA256b66200d4f07c2d3f3c503edfa562b0b367271c09d31e34e90f3705c970f38517
SHA51248fa3093d949d9fce2365d85fe8c83e1c5288e4baa3e590686512c4c805d1fd5671e672603475eddd031a16d05e95361b4a3811d76f76c5b5a72b742b7cd8899
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
1KB
MD52554617f5ea5199193845737e7e7d8f7
SHA1f554ce7419f1f4c1696d6b8d8288791ac85b1aa2
SHA256dad01264f26c2236215a3e45b92fe83fb08e3406b1b121958d0e9c3df4c0ae34
SHA5127444900f9a771bec90f7478714581bce47fe2b398c73ce1b5cc442dc123494388b7d79892955bec1bfcebec05a4562cc4522ededecfa99218990878f9ffc3898
-
Filesize
1KB
MD5b2c6330994f266fba5700478f49519f0
SHA15b600ca4cea5eaa19da91f5576e4c34ebdf3dd43
SHA256cf88f98e44fcc22426cd4fcf327ccc8d753e455a8bdc50062bb6fb144b8b5f96
SHA512d20024f304d7b1700d1704872d7ac942575c4a568f5f78883a263ba625ae2caa16b8ff43f484a1fa55effb1fdd9137e4a021e7a542851b177fe6fe2975829dd4
-
Filesize
428KB
MD5d128701801cbaac6a25281c9c4c20df8
SHA120444d216e10ea34a796ddf1b74a05c9df7885b0
SHA25663f8a0c93ebfb6065f46333938d39251dcf2f524956bdb0f91ac749c7ce70657
SHA512fbb9bfddda25449a9d9932987decca8fa9430de4aa628fd9d7cebc9575693ac6d179bee158dc23dd55911ca2bac4bf7f055228ed0320a35e69cb54ad48d3066b
-
Filesize
315B
MD57624deda1e30ad16feb25b9b052cda3b
SHA135867a6260fbb937a41120b6156bcd0d712a9142
SHA256e9bef3ee6273ee0888a1c5e6606d8bd5a0d1e4c1f133d8f682d6f0bf07296d73
SHA512d11134d40f92ddaee4c3c78a7ee73aed39def0fb6f8da4c25e016f0f663dca562327edc4d37fee3a473545093e47e6679309ebac4169838065a5d4c275da3d2e
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448