Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2023 13:41
Behavioral task
behavioral1
Sample
0x000f00000001201d-56.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0x000f00000001201d-56.exe
Resource
win10v2004-20230703-en
General
-
Target
0x000f00000001201d-56.exe
-
Size
550KB
-
MD5
9dfbed115f029f3501c48806564ec04a
-
SHA1
cf6538e6d6eec51bab88da3963260b9204158e12
-
SHA256
09780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977
-
SHA512
c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1
-
SSDEEP
6144:s+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWYhJ6usHJdJUt:XPw2PjCLe3a6Q70zbpJOHit
Malware Config
Signatures
-
PredatorStealer
Predator is a modular stealer written in C#.
-
Executes dropped EXE 1 IoCs
pid Process 5056 Zip.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\update_231501.exe / start" 0x000f00000001201d-56.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini 0x000f00000001201d-56.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini 0x000f00000001201d-56.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1528 0x000f00000001201d-56.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1528 0x000f00000001201d-56.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1528 0x000f00000001201d-56.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1528 0x000f00000001201d-56.exe Token: SeDebugPrivilege 5056 Zip.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1528 wrote to memory of 5056 1528 0x000f00000001201d-56.exe 86 PID 1528 wrote to memory of 5056 1528 0x000f00000001201d-56.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe"C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Zip.exe"C:\Users\Admin\AppData\Local\Temp\Zip.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5f95fc056a594545d752d19032447a768
SHA1c6cac7e28be0526e3acc46cb2f4a08ea55400b10
SHA256d130571ff7ab31d9c5c879b184365c1e6afd1278fa0ba6b892396ebf52d563a5
SHA512e430a0c800db439c7ae4b328990815b5c8a533ef8f801ca099e8b8fec7093e2781d717ccb21e981741dc12d40685e7428c4b23be40ee02e4e299cf52b0d675ad
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
1KB
MD52554617f5ea5199193845737e7e7d8f7
SHA1f554ce7419f1f4c1696d6b8d8288791ac85b1aa2
SHA256dad01264f26c2236215a3e45b92fe83fb08e3406b1b121958d0e9c3df4c0ae34
SHA5127444900f9a771bec90f7478714581bce47fe2b398c73ce1b5cc442dc123494388b7d79892955bec1bfcebec05a4562cc4522ededecfa99218990878f9ffc3898
-
Filesize
1KB
MD5b9180ee4a2477280ed95eae6ba4b1386
SHA16679abfb3ca988b88d5f53a1736a8c57941af760
SHA256eebf52300cd182c466c9ef68e974759709f8b3d147506a0ad2ea8180191009f9
SHA512ccacceda5990f100a112158b8807a8bfb42f2a56eb58a4570dc81896fa9904598989f0652dec31de25b5a3be08f644ce323e7ca6a3afcf12becd5f85ebd27032
-
Filesize
428KB
MD520572f856ae22a18e5571370e81664f0
SHA11f8ec65b3bf742640c9829f0858438d642fc58cb
SHA25674c3f528f86aa613ef43db28efc60fc7f930c925f9d17034ca7ea80796fe2912
SHA512616a4a0aab195d5de0153017679a80404d065a879c38e532bcf559165a6242c1c38c456de0ba0b2783695559771486bbbf8cebf06a9d19695f258e6fb6946e53
-
Filesize
315B
MD5e4ef543b7f841557098a0ffc164ca299
SHA141e440414ecc0135164db2dbf7dba465c48c1c51
SHA2566ef6d1adb821d5d0cbf620e7171a66e88a680d31a6420b24a2302af20bec173f
SHA512783c5a31d28b33639ec651a82c4f8de73a81503cfe17997329c27182d445375264e1c24c6e3022955ae2840ee58146dfe86fbf5fa69a065c5068a937814b234d
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448