Analysis
-
max time kernel
653s -
max time network
670s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2023 02:20
Static task
static1
Behavioral task
behavioral1
Sample
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
Resource
win10v2004-20230915-en
General
-
Target
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
-
Size
5.3MB
-
MD5
eba4be8ed0e9282976f8ee0b04fb2474
-
SHA1
f4d698ece0ff6af36c1a2e9108ea475518df0aa7
-
SHA256
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
-
SHA512
cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b
-
SSDEEP
98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 1 IoCs
pid Process 1072 Update.exe -
Loads dropped DLL 4 IoCs
pid Process 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 1072 Update.exe 1072 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1808 timeout.exe 3452 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1516 tasklist.exe 2544 tasklist.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 4644 reg.exe 880 reg.exe 4248 reg.exe 4624 reg.exe 1804 reg.exe 4224 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe 1072 Update.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe Token: SeDebugPrivilege 1516 tasklist.exe Token: SeDebugPrivilege 2544 tasklist.exe Token: SeDebugPrivilege 1072 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1072 Update.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1236 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 86 PID 3024 wrote to memory of 1236 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 86 PID 3024 wrote to memory of 3692 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 88 PID 3024 wrote to memory of 3692 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 88 PID 3024 wrote to memory of 672 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 90 PID 3024 wrote to memory of 672 3024 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 90 PID 1236 wrote to memory of 4624 1236 cmd.exe 92 PID 1236 wrote to memory of 4624 1236 cmd.exe 92 PID 3692 wrote to memory of 1804 3692 cmd.exe 93 PID 3692 wrote to memory of 1804 3692 cmd.exe 93 PID 672 wrote to memory of 1516 672 cmd.exe 94 PID 672 wrote to memory of 1516 672 cmd.exe 94 PID 672 wrote to memory of 2692 672 cmd.exe 95 PID 672 wrote to memory of 2692 672 cmd.exe 95 PID 672 wrote to memory of 1808 672 cmd.exe 96 PID 672 wrote to memory of 1808 672 cmd.exe 96 PID 672 wrote to memory of 2544 672 cmd.exe 99 PID 672 wrote to memory of 2544 672 cmd.exe 99 PID 672 wrote to memory of 3156 672 cmd.exe 100 PID 672 wrote to memory of 3156 672 cmd.exe 100 PID 672 wrote to memory of 3452 672 cmd.exe 102 PID 672 wrote to memory of 3452 672 cmd.exe 102 PID 672 wrote to memory of 1072 672 cmd.exe 103 PID 672 wrote to memory of 1072 672 cmd.exe 103 PID 1072 wrote to memory of 4636 1072 Update.exe 106 PID 1072 wrote to memory of 4636 1072 Update.exe 106 PID 1072 wrote to memory of 908 1072 Update.exe 108 PID 1072 wrote to memory of 908 1072 Update.exe 108 PID 4636 wrote to memory of 4224 4636 cmd.exe 110 PID 4636 wrote to memory of 4224 4636 cmd.exe 110 PID 908 wrote to memory of 4644 908 cmd.exe 111 PID 908 wrote to memory of 4644 908 cmd.exe 111 PID 1072 wrote to memory of 3184 1072 Update.exe 113 PID 1072 wrote to memory of 3184 1072 Update.exe 113 PID 1072 wrote to memory of 2260 1072 Update.exe 115 PID 1072 wrote to memory of 2260 1072 Update.exe 115 PID 3184 wrote to memory of 880 3184 cmd.exe 117 PID 3184 wrote to memory of 880 3184 cmd.exe 117 PID 2260 wrote to memory of 4248 2260 cmd.exe 118 PID 2260 wrote to memory of 4248 2260 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f2⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f3⤵
- Modifies registry key
PID:4624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1DB0.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1DB0.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3024"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2692
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1808
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3024"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3156
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3452
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f4⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f5⤵
- Modifies registry key
PID:4224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:4644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f4⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f5⤵
- Modifies registry key
PID:880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:4248
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57f1799b65b98450a19e4d049e9d3e70d
SHA1ec80c5a33374423a9e986c383a36a97da70a3584
SHA25668705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6
SHA5128d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78
-
Filesize
156KB
MD57f1799b65b98450a19e4d049e9d3e70d
SHA1ec80c5a33374423a9e986c383a36a97da70a3584
SHA25668705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6
SHA5128d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78
-
Filesize
156KB
MD57f1799b65b98450a19e4d049e9d3e70d
SHA1ec80c5a33374423a9e986c383a36a97da70a3584
SHA25668705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6
SHA5128d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
332B
MD5a79db7c14cd272cd05bc2c885b07553c
SHA16b77311173ff47d0214d904e345cb0e189f2a027
SHA256e939df31282f4fb96fb578530a00c645aefddc4f03192c77d58bdf176226c303
SHA512ca5c2bbe5461bc7fc6bad7321092ac221598e6e885e6015782e4ee3ab17a3854fe86cf403b7443dbf9df992da953961d6470ba1e854fef33d19796a29d57eb53
-
Filesize
5.3MB
MD5eba4be8ed0e9282976f8ee0b04fb2474
SHA1f4d698ece0ff6af36c1a2e9108ea475518df0aa7
SHA2566d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
SHA512cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b
-
Filesize
5.3MB
MD5eba4be8ed0e9282976f8ee0b04fb2474
SHA1f4d698ece0ff6af36c1a2e9108ea475518df0aa7
SHA2566d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
SHA512cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b