Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2023 13:41

General

  • Target

    0x000f00000001201d-56.exe

  • Size

    550KB

  • MD5

    9dfbed115f029f3501c48806564ec04a

  • SHA1

    cf6538e6d6eec51bab88da3963260b9204158e12

  • SHA256

    09780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977

  • SHA512

    c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1

  • SSDEEP

    6144:s+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWYhJ6usHJdJUt:XPw2PjCLe3a6Q70zbpJOHit

Malware Config

Signatures

  • PredatorStealer

    Predator is a modular stealer written in C#.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000f00000001201d-56.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\Zip.exe
      "C:\Users\Admin\AppData\Local\Temp\Zip.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672.zip

    Filesize

    428KB

    MD5

    f95fc056a594545d752d19032447a768

    SHA1

    c6cac7e28be0526e3acc46cb2f4a08ea55400b10

    SHA256

    d130571ff7ab31d9c5c879b184365c1e6afd1278fa0ba6b892396ebf52d563a5

    SHA512

    e430a0c800db439c7ae4b328990815b5c8a533ef8f801ca099e8b8fec7093e2781d717ccb21e981741dc12d40685e7428c4b23be40ee02e4e299cf52b0d675ad

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini

    Filesize

    282B

    MD5

    9e36cc3537ee9ee1e3b10fa4e761045b

    SHA1

    7726f55012e1e26cc762c9982e7c6c54ca7bb303

    SHA256

    4b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026

    SHA512

    5f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\ProgramList.txt

    Filesize

    1KB

    MD5

    2554617f5ea5199193845737e7e7d8f7

    SHA1

    f554ce7419f1f4c1696d6b8d8288791ac85b1aa2

    SHA256

    dad01264f26c2236215a3e45b92fe83fb08e3406b1b121958d0e9c3df4c0ae34

    SHA512

    7444900f9a771bec90f7478714581bce47fe2b398c73ce1b5cc442dc123494388b7d79892955bec1bfcebec05a4562cc4522ededecfa99218990878f9ffc3898

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\ProsessList.txt

    Filesize

    1KB

    MD5

    b9180ee4a2477280ed95eae6ba4b1386

    SHA1

    6679abfb3ca988b88d5f53a1736a8c57941af760

    SHA256

    eebf52300cd182c466c9ef68e974759709f8b3d147506a0ad2ea8180191009f9

    SHA512

    ccacceda5990f100a112158b8807a8bfb42f2a56eb58a4570dc81896fa9904598989f0652dec31de25b5a3be08f644ce323e7ca6a3afcf12becd5f85ebd27032

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Screenshot.png

    Filesize

    428KB

    MD5

    20572f856ae22a18e5571370e81664f0

    SHA1

    1f8ec65b3bf742640c9829f0858438d642fc58cb

    SHA256

    74c3f528f86aa613ef43db28efc60fc7f930c925f9d17034ca7ea80796fe2912

    SHA512

    616a4a0aab195d5de0153017679a80404d065a879c38e532bcf559165a6242c1c38c456de0ba0b2783695559771486bbbf8cebf06a9d19695f258e6fb6946e53

  • C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\info.txt

    Filesize

    315B

    MD5

    e4ef543b7f841557098a0ffc164ca299

    SHA1

    41e440414ecc0135164db2dbf7dba465c48c1c51

    SHA256

    6ef6d1adb821d5d0cbf620e7171a66e88a680d31a6420b24a2302af20bec173f

    SHA512

    783c5a31d28b33639ec651a82c4f8de73a81503cfe17997329c27182d445375264e1c24c6e3022955ae2840ee58146dfe86fbf5fa69a065c5068a937814b234d

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    3afd64484a2a34fc34d1155747dd3847

    SHA1

    451e1d878179f6fcfbaf9fa79d9ee8207489748f

    SHA256

    bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9

    SHA512

    d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448

  • memory/1528-144-0x00007FFEF4B20000-0x00007FFEF55E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1528-138-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/1528-134-0x00007FFEF4B20000-0x00007FFEF55E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1528-174-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/1528-161-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/1528-162-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/1528-173-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/1528-136-0x000000001B710000-0x000000001B8D2000-memory.dmp

    Filesize

    1.8MB

  • memory/1528-133-0x0000000000620000-0x00000000006B0000-memory.dmp

    Filesize

    576KB

  • memory/1528-145-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/1528-137-0x000000001C610000-0x000000001CB38000-memory.dmp

    Filesize

    5.2MB

  • memory/1528-135-0x000000001B370000-0x000000001B380000-memory.dmp

    Filesize

    64KB

  • memory/5056-164-0x000001FFFDF80000-0x000001FFFDF92000-memory.dmp

    Filesize

    72KB

  • memory/5056-172-0x00007FFEF4B20000-0x00007FFEF55E1000-memory.dmp

    Filesize

    10.8MB

  • memory/5056-163-0x000001FFFDF40000-0x000001FFFDF4A000-memory.dmp

    Filesize

    40KB

  • memory/5056-160-0x00007FFEF4B20000-0x00007FFEF55E1000-memory.dmp

    Filesize

    10.8MB

  • memory/5056-159-0x000001FFFB9F0000-0x000001FFFBA00000-memory.dmp

    Filesize

    64KB