Resubmissions

06-11-2023 13:20

231106-qlacesbc9s 10

17-10-2023 02:20

231017-csxjmsgg7s 7

Analysis

  • max time kernel
    566s
  • max time network
    618s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2023 02:20

General

  • Target

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe

  • Size

    5.3MB

  • MD5

    eba4be8ed0e9282976f8ee0b04fb2474

  • SHA1

    f4d698ece0ff6af36c1a2e9108ea475518df0aa7

  • SHA256

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

  • SHA512

    cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

  • SSDEEP

    98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
    "C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\system32\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
        3⤵
        • Modifies registry key
        PID:2132
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\system32\reg.exe
        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1064
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp9D77.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp9D77.tmp.bat
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 2632"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1932
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:740
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2848
        • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
          "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2808
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1684
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:568
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1560
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:756
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:592
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:288
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2808 -s 1048
            4⤵
              PID:1464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • C:\Users\Admin\AppData\Local\Temp\tmp9D77.tmp.bat

        Filesize

        332B

        MD5

        7573eed0028451e1b4ca499a132d640c

        SHA1

        42ef18c6000ad36284160fbc2ad227319960d839

        SHA256

        bad4df4154794b38e9bb2596f2e5400b58ed3e3017dbe60fcacfe911268cf72f

        SHA512

        ba6a6590a54881c0dafdabf8a2d360be82ab503220541f273f8ff2d04ca3c429fb43eb0e240f30b76fcdd3c7da1bb871511133da0aa3845eea324c5f2e1c7506

      • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

        Filesize

        5.3MB

        MD5

        eba4be8ed0e9282976f8ee0b04fb2474

        SHA1

        f4d698ece0ff6af36c1a2e9108ea475518df0aa7

        SHA256

        6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

        SHA512

        cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

      • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

        Filesize

        5.3MB

        MD5

        eba4be8ed0e9282976f8ee0b04fb2474

        SHA1

        f4d698ece0ff6af36c1a2e9108ea475518df0aa7

        SHA256

        6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

        SHA512

        cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • memory/2632-14-0x000007FEF5C20000-0x000007FEF660C000-memory.dmp

        Filesize

        9.9MB

      • memory/2632-11-0x000000001B300000-0x000000001B380000-memory.dmp

        Filesize

        512KB

      • memory/2632-10-0x000007FEF5C20000-0x000007FEF660C000-memory.dmp

        Filesize

        9.9MB

      • memory/2632-0-0x0000000000DC0000-0x0000000001310000-memory.dmp

        Filesize

        5.3MB

      • memory/2632-9-0x000000001B300000-0x000000001B380000-memory.dmp

        Filesize

        512KB

      • memory/2632-1-0x000007FEF5C20000-0x000007FEF660C000-memory.dmp

        Filesize

        9.9MB

      • memory/2808-20-0x0000000000C60000-0x00000000011B0000-memory.dmp

        Filesize

        5.3MB

      • memory/2808-19-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

        Filesize

        9.9MB

      • memory/2808-25-0x000000001B5D0000-0x000000001B650000-memory.dmp

        Filesize

        512KB

      • memory/2808-26-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

        Filesize

        9.9MB

      • memory/2808-27-0x000000001B5D0000-0x000000001B650000-memory.dmp

        Filesize

        512KB

      • memory/2808-28-0x000000001B410000-0x000000001B47A000-memory.dmp

        Filesize

        424KB

      • memory/2808-31-0x0000000000C30000-0x0000000000C55000-memory.dmp

        Filesize

        148KB

      • memory/2808-40-0x000000001B5D0000-0x000000001B650000-memory.dmp

        Filesize

        512KB

      • memory/2808-41-0x000000001B5D0000-0x000000001B650000-memory.dmp

        Filesize

        512KB

      • memory/2808-42-0x000000001B5D0000-0x000000001B650000-memory.dmp

        Filesize

        512KB