Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 19:32
Static task
static1
Behavioral task
behavioral1
Sample
edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe
-
Size
620KB
-
MD5
e36ce22684d90063256005787dc6f20b
-
SHA1
bc7647d15e52e72bf36fda20e782965a2e7e47ba
-
SHA256
edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa
-
SHA512
e779725bb997951150788f81e10ebffa64bc406b519b78dda612955e597ca602b6fd0bfa471fe5abf35e585af5d9c92c6c593958d941c354dd5a5011e490bdb6
-
SSDEEP
12288:D8t1GmK3ENAdy1YWEt3IRiRwxahJCKxXoRwh3CX7wBO09yrxR+tmtR:D8vGz3EACLEtMEDxVoR0SMwjTR
Malware Config
Extracted
predatorstealer
http://www.biopharmzpharma.com/Maxwhite/
Signatures
-
PredatorStealer
Predator is a modular stealer written in C#.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 13.dll -
Executes dropped EXE 2 IoCs
pid Process 2920 13.dll 2364 Zip.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 13.dll Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 13.dll Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 13.dll -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\update_233007.exe / start" 13.dll -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini 13.dll File opened for modification C:\Users\Admin\AppData\Local\Temp\NL_BFEBFBFF00090672\Files\desktop.ini 13.dll -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1204 2920 WerFault.exe 81 1900 2920 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2920 13.dll -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2920 13.dll Token: SeDebugPrivilege 2364 Zip.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3764 edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3764 wrote to memory of 2920 3764 edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe 81 PID 3764 wrote to memory of 2920 3764 edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe 81 PID 2920 wrote to memory of 2364 2920 13.dll 88 PID 2920 wrote to memory of 2364 2920 13.dll 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 13.dll -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 13.dll
Processes
-
C:\Users\Admin\AppData\Local\Temp\edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe"C:\Users\Admin\AppData\Local\Temp\edbcfe1171767f6e2a18266e14039c5fecfd0922fd5eca64971a901ea2d9d8aa_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\13.dllC:\Users\Admin\AppData\Local\Temp\13.dll2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Zip.exe"C:\Users\Admin\AppData\Local\Temp\Zip.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2920 -s 25523⤵
- Program crash
PID:1204
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2920 -s 25523⤵
- Program crash
PID:1900
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 176 -p 2920 -ip 29201⤵PID:4212
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 2920 -ip 29201⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD59dfbed115f029f3501c48806564ec04a
SHA1cf6538e6d6eec51bab88da3963260b9204158e12
SHA25609780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977
SHA512c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1
-
Filesize
550KB
MD59dfbed115f029f3501c48806564ec04a
SHA1cf6538e6d6eec51bab88da3963260b9204158e12
SHA25609780015b2aeb7e82bdd67973f45d5eea247ff19057ed8be1c61d8c434983977
SHA512c4812f3fb9f89f65beefb972391fe58c4745ce221a24d8e597254f53d1f091e2178bb8613c35772ee0bb4aca7e5beebc368cd17cc07fdc82cc2fd1b2a0112be1
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
1KB
MD52554617f5ea5199193845737e7e7d8f7
SHA1f554ce7419f1f4c1696d6b8d8288791ac85b1aa2
SHA256dad01264f26c2236215a3e45b92fe83fb08e3406b1b121958d0e9c3df4c0ae34
SHA5127444900f9a771bec90f7478714581bce47fe2b398c73ce1b5cc442dc123494388b7d79892955bec1bfcebec05a4562cc4522ededecfa99218990878f9ffc3898
-
Filesize
1KB
MD5e3bfd93647cfe2866ecf2cd4dd200e40
SHA160014e1efa268b828de294940c2ba3849c8e3c1b
SHA256d1f86072b08a04f96d67bd165ba27f368a62700e87d8a10652926a0b72034e48
SHA5122d4918a8a1ab0e037319d6fce90e671aded9df62acb99817d2e5e60671a7bf9960ffbf18ae6765df0f0ce204d072c3a5c60850c5735c17eefb1ff597c79e4e8d
-
Filesize
420KB
MD59aa5e18d8c8f39552d0935873eb1297b
SHA169baac6378e002e4df917f8afd514ed9b3df85e7
SHA256b55a7f9e6f27c71830142497bb418235166bb373abe7ad5146c4cb79aeee294f
SHA5127f5cc8407fedcca16c064cff403fe878a9432381d26dff8af3c1d81362e93c95c71aaa89223c1c4cba9010170c10e93c25c7944d1ef7767286db86c074b92862
-
Filesize
315B
MD5e4ef543b7f841557098a0ffc164ca299
SHA141e440414ecc0135164db2dbf7dba465c48c1c51
SHA2566ef6d1adb821d5d0cbf620e7171a66e88a680d31a6420b24a2302af20bec173f
SHA512783c5a31d28b33639ec651a82c4f8de73a81503cfe17997329c27182d445375264e1c24c6e3022955ae2840ee58146dfe86fbf5fa69a065c5068a937814b234d
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448
-
Filesize
31KB
MD53afd64484a2a34fc34d1155747dd3847
SHA1451e1d878179f6fcfbaf9fa79d9ee8207489748f
SHA256bf78263914c6d3f84f825504536338fadd15868d788bf30d30613ca27abeb7a9
SHA512d21a519c8867d569e56ac5c93ce861a72f6853e3a959467bf8e8779664f99b5e8be76ad27e078935191c798aea05891960e01d9a0d52e2a33d34ec5a58c00448