Resubmissions

06-11-2023 13:20

231106-qlacesbc9s 10

17-10-2023 02:20

231017-csxjmsgg7s 7

Analysis

  • max time kernel
    653s
  • max time network
    670s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2023 02:20

General

  • Target

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe

  • Size

    5.3MB

  • MD5

    eba4be8ed0e9282976f8ee0b04fb2474

  • SHA1

    f4d698ece0ff6af36c1a2e9108ea475518df0aa7

  • SHA256

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

  • SHA512

    cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

  • SSDEEP

    98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
    "C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Windows\system32\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
        3⤵
        • Modifies registry key
        PID:4624
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Windows\system32\reg.exe
        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1804
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1DB0.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1DB0.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 3024"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1516
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:2692
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:1808
        • C:\Windows\system32\tasklist.exe
          Tasklist /fi "PID eq 3024"
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2544
        • C:\Windows\system32\find.exe
          find ":"
          3⤵
            PID:3156
          • C:\Windows\system32\timeout.exe
            Timeout /T 1 /Nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3452
          • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
            "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1072
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4636
              • C:\Windows\system32\reg.exe
                reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
                5⤵
                • Modifies registry key
                PID:4224
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:908
              • C:\Windows\system32\reg.exe
                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                5⤵
                • Adds Run key to start application
                • Modifies registry key
                PID:4644
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3184
              • C:\Windows\system32\reg.exe
                reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
                5⤵
                • Modifies registry key
                PID:880
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2260
              • C:\Windows\system32\reg.exe
                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                5⤵
                • Adds Run key to start application
                • Modifies registry key
                PID:4248

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • C:\Users\Admin\AppData\Local\Temp\tmp1DB0.tmp.bat

        Filesize

        332B

        MD5

        a79db7c14cd272cd05bc2c885b07553c

        SHA1

        6b77311173ff47d0214d904e345cb0e189f2a027

        SHA256

        e939df31282f4fb96fb578530a00c645aefddc4f03192c77d58bdf176226c303

        SHA512

        ca5c2bbe5461bc7fc6bad7321092ac221598e6e885e6015782e4ee3ab17a3854fe86cf403b7443dbf9df992da953961d6470ba1e854fef33d19796a29d57eb53

      • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

        Filesize

        5.3MB

        MD5

        eba4be8ed0e9282976f8ee0b04fb2474

        SHA1

        f4d698ece0ff6af36c1a2e9108ea475518df0aa7

        SHA256

        6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

        SHA512

        cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

      • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

        Filesize

        5.3MB

        MD5

        eba4be8ed0e9282976f8ee0b04fb2474

        SHA1

        f4d698ece0ff6af36c1a2e9108ea475518df0aa7

        SHA256

        6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

        SHA512

        cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

      • memory/1072-30-0x0000017042B10000-0x0000017042B1A000-memory.dmp

        Filesize

        40KB

      • memory/1072-29-0x0000017041110000-0x0000017041120000-memory.dmp

        Filesize

        64KB

      • memory/1072-58-0x0000017041110000-0x0000017041120000-memory.dmp

        Filesize

        64KB

      • memory/1072-56-0x0000017041110000-0x0000017041120000-memory.dmp

        Filesize

        64KB

      • memory/1072-22-0x00007FFE77380000-0x00007FFE77E41000-memory.dmp

        Filesize

        10.8MB

      • memory/1072-53-0x000001705BF80000-0x000001705BF92000-memory.dmp

        Filesize

        72KB

      • memory/1072-35-0x000001705B3B0000-0x000001705B3D6000-memory.dmp

        Filesize

        152KB

      • memory/1072-34-0x000001705BFA0000-0x000001705BFDA000-memory.dmp

        Filesize

        232KB

      • memory/1072-27-0x0000017041110000-0x0000017041120000-memory.dmp

        Filesize

        64KB

      • memory/1072-31-0x000001705BEF0000-0x000001705BF5A000-memory.dmp

        Filesize

        424KB

      • memory/1072-28-0x00007FFE77380000-0x00007FFE77E41000-memory.dmp

        Filesize

        10.8MB

      • memory/3024-11-0x00007FFE78360000-0x00007FFE78E21000-memory.dmp

        Filesize

        10.8MB

      • memory/3024-0-0x0000021BDA430000-0x0000021BDA980000-memory.dmp

        Filesize

        5.3MB

      • memory/3024-8-0x0000021BF4E00000-0x0000021BF4E76000-memory.dmp

        Filesize

        472KB

      • memory/3024-9-0x00007FFE78360000-0x00007FFE78E21000-memory.dmp

        Filesize

        10.8MB

      • memory/3024-10-0x0000021BF4DF0000-0x0000021BF4E00000-memory.dmp

        Filesize

        64KB

      • memory/3024-18-0x00007FFE78360000-0x00007FFE78E21000-memory.dmp

        Filesize

        10.8MB

      • memory/3024-12-0x0000021BF4DF0000-0x0000021BF4E00000-memory.dmp

        Filesize

        64KB

      • memory/3024-13-0x0000021BDC570000-0x0000021BDC58E000-memory.dmp

        Filesize

        120KB