Analysis

  • max time kernel
    67s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2023 02:42

General

  • Target

    a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe

  • Size

    158.0MB

  • MD5

    cc2c8d512857a17adb73a8766a8c6919

  • SHA1

    e5ee90693b92785f14bb6063f92f46b9bff561f0

  • SHA256

    a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5

  • SHA512

    2b9a2280e813a929866588374178e9f9fed48f337b5c97719a6391192f55f1db61d94136916fed8eb8be1c46345d5ef4bb4df078131d5b0aec862a4dade364dc

  • SSDEEP

    1572864:IWaH/Eoq13lOsygFXvraqpQwvKeh0ew1988ae7XRuiRU2A:nxlDZF/raqpQwiyiR8

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe
    "C:\Users\Admin\AppData\Local\Temp\a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "msedge"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4688
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4504
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      PID:3656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    1a2969cec968310d4e569c9417a4791a

    SHA1

    23529e28f00c0989687bacae91b595999ab1534e

    SHA256

    0ec55e6b6bd8e5cf9afda8cd2b1677df6dde5b0c12885bbb2f43f05b42d55518

    SHA512

    23542242b8157ad35bd3d454c161225699dceff1fe68f41996280eb581b196439ff4691910e375e3ca3f93a71216c283767105687a538ce9c3bd30a482b65093

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    3f091062175982c8771f33a6f4dc3cce

    SHA1

    7cf6e87a218c80d90bdd57d53e1ee77c9127b90b

    SHA256

    09be24ce413cf8a7402bc1f4840f053399b7a4d2646428257d94a6d1dd1d18db

    SHA512

    c1ad48d7732f88300d67e5fbdf1c4bec132747244eb8e678e7f6e37659ea5e81e399283389ccf055b1e15e6f0efbccccc589b44fead2d58678aaae6efd7ab604

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    41c7c46cfdcccaed611db23a96bd2c99

    SHA1

    80f685cd297e68655301107eff8ae85b3574183d

    SHA256

    6ff06b54677d32a26d7230adc14fca1d2e007ae483a156eb801e9d5d82fd5402

    SHA512

    ca714d462b57443958a31b061a8154aff3e2a8003ce6e4e6995536b93954ac32ead0b7a7b6d0385dd95d8a49d75aa4347d2901b2acef466bb5687cef50661615

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    41c7c46cfdcccaed611db23a96bd2c99

    SHA1

    80f685cd297e68655301107eff8ae85b3574183d

    SHA256

    6ff06b54677d32a26d7230adc14fca1d2e007ae483a156eb801e9d5d82fd5402

    SHA512

    ca714d462b57443958a31b061a8154aff3e2a8003ce6e4e6995536b93954ac32ead0b7a7b6d0385dd95d8a49d75aa4347d2901b2acef466bb5687cef50661615

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iudyvbtj.fm5.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3656-259-0x0000000000580000-0x0000000000DC3000-memory.dmp

    Filesize

    8.3MB

  • memory/3656-256-0x0000000000580000-0x0000000000DC3000-memory.dmp

    Filesize

    8.3MB

  • memory/3736-146-0x00000000062A0000-0x0000000006336000-memory.dmp

    Filesize

    600KB

  • memory/3736-143-0x0000000005890000-0x0000000005BE4000-memory.dmp

    Filesize

    3.3MB

  • memory/3736-148-0x0000000006D40000-0x0000000006D62000-memory.dmp

    Filesize

    136KB

  • memory/3736-147-0x0000000006230000-0x000000000624A000-memory.dmp

    Filesize

    104KB

  • memory/3736-126-0x0000000002430000-0x0000000002466000-memory.dmp

    Filesize

    216KB

  • memory/3736-145-0x0000000005D80000-0x0000000005DCC000-memory.dmp

    Filesize

    304KB

  • memory/3736-144-0x0000000005D40000-0x0000000005D5E000-memory.dmp

    Filesize

    120KB

  • memory/3736-149-0x0000000007320000-0x00000000078C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3736-142-0x0000000005810000-0x0000000005876000-memory.dmp

    Filesize

    408KB

  • memory/3736-152-0x0000000073BE0000-0x0000000074390000-memory.dmp

    Filesize

    7.7MB

  • memory/3736-132-0x00000000056A0000-0x0000000005706000-memory.dmp

    Filesize

    408KB

  • memory/3736-131-0x0000000004DB0000-0x0000000004DD2000-memory.dmp

    Filesize

    136KB

  • memory/3736-130-0x0000000004E00000-0x0000000005428000-memory.dmp

    Filesize

    6.2MB

  • memory/3736-129-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/3736-127-0x0000000073BE0000-0x0000000074390000-memory.dmp

    Filesize

    7.7MB

  • memory/3736-128-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4152-32-0x0000000006EE0000-0x0000000006EF5000-memory.dmp

    Filesize

    84KB

  • memory/4152-24-0x000000000B380000-0x000000000B6D6000-memory.dmp

    Filesize

    3.3MB

  • memory/4152-52-0x000000000B1C0000-0x000000000B1D2000-memory.dmp

    Filesize

    72KB

  • memory/4152-55-0x000000000B1C0000-0x000000000B1D2000-memory.dmp

    Filesize

    72KB

  • memory/4152-56-0x000000000B100000-0x000000000B106000-memory.dmp

    Filesize

    24KB

  • memory/4152-59-0x000000000B100000-0x000000000B106000-memory.dmp

    Filesize

    24KB

  • memory/4152-60-0x000000000B1B0000-0x000000000B1BC000-memory.dmp

    Filesize

    48KB

  • memory/4152-63-0x000000000B1B0000-0x000000000B1BC000-memory.dmp

    Filesize

    48KB

  • memory/4152-64-0x000000000B300000-0x000000000B33A000-memory.dmp

    Filesize

    232KB

  • memory/4152-48-0x000000000AE50000-0x000000000AE8C000-memory.dmp

    Filesize

    240KB

  • memory/4152-47-0x000000000B110000-0x000000000B18A000-memory.dmp

    Filesize

    488KB

  • memory/4152-44-0x000000000B110000-0x000000000B18A000-memory.dmp

    Filesize

    488KB

  • memory/4152-43-0x000000000AD00000-0x000000000AD96000-memory.dmp

    Filesize

    600KB

  • memory/4152-40-0x000000000AD00000-0x000000000AD96000-memory.dmp

    Filesize

    600KB

  • memory/4152-39-0x000000000B020000-0x000000000B074000-memory.dmp

    Filesize

    336KB

  • memory/4152-36-0x000000000B020000-0x000000000B074000-memory.dmp

    Filesize

    336KB

  • memory/4152-35-0x0000000006EE0000-0x0000000006EF5000-memory.dmp

    Filesize

    84KB

  • memory/4152-0-0x0000000006F00000-0x0000000007889000-memory.dmp

    Filesize

    9.5MB

  • memory/4152-31-0x000000000ADA0000-0x000000000AE45000-memory.dmp

    Filesize

    660KB

  • memory/4152-28-0x000000000ADA0000-0x000000000AE45000-memory.dmp

    Filesize

    660KB

  • memory/4152-27-0x000000000B380000-0x000000000B6D6000-memory.dmp

    Filesize

    3.3MB

  • memory/4152-51-0x000000000AE50000-0x000000000AE8C000-memory.dmp

    Filesize

    240KB

  • memory/4152-23-0x0000000006DD0000-0x0000000006E00000-memory.dmp

    Filesize

    192KB

  • memory/4152-20-0x0000000006DD0000-0x0000000006E00000-memory.dmp

    Filesize

    192KB

  • memory/4152-19-0x000000000AE90000-0x000000000B01E000-memory.dmp

    Filesize

    1.6MB

  • memory/4152-16-0x000000000AE90000-0x000000000B01E000-memory.dmp

    Filesize

    1.6MB

  • memory/4152-15-0x0000000006890000-0x00000000068B8000-memory.dmp

    Filesize

    160KB

  • memory/4152-3-0x0000000006F00000-0x0000000007889000-memory.dmp

    Filesize

    9.5MB

  • memory/4152-258-0x0000000000450000-0x0000000000C9F000-memory.dmp

    Filesize

    8.3MB

  • memory/4152-4-0x00000000069E0000-0x0000000006A87000-memory.dmp

    Filesize

    668KB

  • memory/4152-12-0x0000000006890000-0x00000000068B8000-memory.dmp

    Filesize

    160KB

  • memory/4152-6-0x0000000000450000-0x0000000000C9F000-memory.dmp

    Filesize

    8.3MB

  • memory/4152-179-0x0000000000450000-0x0000000000C9F000-memory.dmp

    Filesize

    8.3MB

  • memory/4152-9-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/4152-8-0x00000000069E0000-0x0000000006A87000-memory.dmp

    Filesize

    668KB

  • memory/4504-181-0x0000000002690000-0x00000000026A0000-memory.dmp

    Filesize

    64KB

  • memory/4504-193-0x0000000073BE0000-0x0000000074390000-memory.dmp

    Filesize

    7.7MB

  • memory/4504-180-0x0000000073BE0000-0x0000000074390000-memory.dmp

    Filesize

    7.7MB

  • memory/4688-177-0x0000000073BE0000-0x0000000074390000-memory.dmp

    Filesize

    7.7MB

  • memory/4688-164-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB

  • memory/4688-165-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB

  • memory/4688-163-0x0000000073BE0000-0x0000000074390000-memory.dmp

    Filesize

    7.7MB