Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 16:17
Behavioral task
behavioral1
Sample
deadsense.exe
Resource
win7-20231023-en
General
-
Target
deadsense.exe
-
Size
274KB
-
MD5
3052e30d962a23b4e3766f025b8d6c21
-
SHA1
97bec7796489888ad6aacdc5f3281f88c0287cf1
-
SHA256
a35b29189e4ea69890b73e5c64a26a3badc61b9e2084ddfa1a959bc6241ff1dd
-
SHA512
cf9a993eeba2440a6bacedff874a3b84e7112e6f11dfebc4d591380b462bdb1a247099290c5fa448d0431daa7ec55080db6d23219da1c10ca2a168ade5e4b680
-
SSDEEP
6144:Zf+BLtABPDWlR1ZroWT0Ilb5wqlYeJClA1D0Ne9:4luK0Ilb5/lYe11Dx9
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1106246820465754193/PhLXU_8QVd9PKEsWp1wYfiuAgulXvdo3vNtxDX_F2rZvdBoVeobiSd4lhoRwXHxlyOwF
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
deadsense.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 deadsense.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier deadsense.exe -
Processes:
Groove.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" Groove.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" Groove.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote Groove.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel Groove.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\MenuExt Groove.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" Groove.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" Groove.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar Groove.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" Groove.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
deadsense.exeGroove.exepid process 2372 deadsense.exe 2372 deadsense.exe 2372 deadsense.exe 2372 deadsense.exe 1332 Groove.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
deadsense.exedescription pid process Token: SeDebugPrivilege 2372 deadsense.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Groove.exeDW20.EXEdescription pid process target process PID 1332 wrote to memory of 1148 1332 Groove.exe DW20.EXE PID 1332 wrote to memory of 1148 1332 Groove.exe DW20.EXE PID 1332 wrote to memory of 1148 1332 Groove.exe DW20.EXE PID 1332 wrote to memory of 1148 1332 Groove.exe DW20.EXE PID 1332 wrote to memory of 1148 1332 Groove.exe DW20.EXE PID 1332 wrote to memory of 1148 1332 Groove.exe DW20.EXE PID 1332 wrote to memory of 1148 1332 Groove.exe DW20.EXE PID 1148 wrote to memory of 1888 1148 DW20.EXE dwwin.exe PID 1148 wrote to memory of 1888 1148 DW20.EXE dwwin.exe PID 1148 wrote to memory of 1888 1148 DW20.EXE dwwin.exe PID 1148 wrote to memory of 1888 1148 DW20.EXE dwwin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\deadsense.exe"C:\Users\Admin\AppData\Local\Temp\deadsense.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove.exe"C:\Program Files (x86)\Microsoft Office\Office14\Groove.exe" /TrayOnly /NoLogon1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 13242⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 13243⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{6FBD882C-1B38-4BE2-B19D-6F722B491FAE}.FSD
Filesize128KB
MD54791a7dd0bdf12d24c0d97edf5480b28
SHA16cca8333432073deb292404d313b72c60b2ce972
SHA2568bb3af420aeaf8af9dc5b97d6bc5fee4c3b57d7f66de621e9e628d05591e1f8b
SHA5128ea98e0e4c482362cc09f3b1735fe868ee38f100ed47b4dd01a0c5c51c7591ff2f1f6d8e5560a7e76306a553b59ba1c03c43424022310eeee0dd966cf6d32360
-
Filesize
560B
MD565e3e3812afa0df536f78048305e5847
SHA1f783c0964b05cfc79489334958d1d7d4b7c17b27
SHA2566985b2832de53a3567fb72918255cf65d429ff2e87b077d0113fb20c32ebc956
SHA5122e9a5e280a834ab35cc6968b0f4eec4ef64c8aabeffcb954833024a83a78aa51832f92a55fb7e6c1a2adadc3fdc59e5445bd3437a7b9df0dd5676f1283533955
-
Filesize
128KB
MD582d5f2735355d4e27384d918fde30a13
SHA134cb24c00e5d5f5f2ed7c98eb70fc21f7be2a1c4
SHA2565056784a3a6df6795fe090bc0b4cc1129b4724f499d3922d31f13f952099c8d3
SHA512e63a45c794d16ff78d9eb2fd1361c75c46a7d40f18883b786254d26d08fe4ddb5fc68563f91445277b6c7f9c1e60112a7d0d1a6a14246d181583cbba458e7ee4
-
Filesize
159B
MD5adf6abbfdc3d7c790e1cc3f61fe795ae
SHA1fd7bd6ddf566baab108a27cc4000eec2cbc38395
SHA256a7e69d7be47aae6db55b5f6accc173e7f45ebb92c057be63b333732bec862cb6
SHA512f7be7dd5998a2615462934364bca133ae84d92ae194e7939fcc3f9ec0d1ec4deba5308216bce5edcf4c8ec17b30fd8160eec08138b60b458a9f57868395c28b6
-
Filesize
348B
MD55f099c91e7e606c55873319b3189df1b
SHA132f90d752502abf0c4673ea953b4506f86f13468
SHA256d42dc02aac3c6c2182b60681f3f4f8a8756f02db6dc865ab096af674571307b0
SHA5128be75bab67c035d452bb063e35c699331b016b0be26d99ac5353305a039b5866b9c744daab99fe214016124323acb0298b384b33789a94c665974ff17e15ec4f