Analysis
-
max time kernel
67s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2023 02:42
Behavioral task
behavioral1
Sample
a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe
Resource
win10v2004-20231130-en
General
-
Target
a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe
-
Size
158.0MB
-
MD5
cc2c8d512857a17adb73a8766a8c6919
-
SHA1
e5ee90693b92785f14bb6063f92f46b9bff561f0
-
SHA256
a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5
-
SHA512
2b9a2280e813a929866588374178e9f9fed48f337b5c97719a6391192f55f1db61d94136916fed8eb8be1c46345d5ef4bb4df078131d5b0aec862a4dade364dc
-
SSDEEP
1572864:IWaH/Eoq13lOsygFXvraqpQwvKeh0ew1988ae7XRuiRU2A:nxlDZF/raqpQwiyiR8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\Control Panel\International\Geo\Nation a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe -
Executes dropped EXE 1 IoCs
Processes:
Chrome Service.exepid Process 3656 Chrome Service.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleChromed = "C:\\Users\\Admin\\AppData\\Local\\Public Program\\Chrome Service.exe" a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipinfo.io -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid Process 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 4688 powershell.exe 4688 powershell.exe 4688 powershell.exe 4504 powershell.exe 4504 powershell.exe 4504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 3736 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exedescription pid Process procid_target PID 4152 wrote to memory of 3736 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 90 PID 4152 wrote to memory of 3736 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 90 PID 4152 wrote to memory of 3736 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 90 PID 4152 wrote to memory of 4688 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 92 PID 4152 wrote to memory of 4688 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 92 PID 4152 wrote to memory of 4688 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 92 PID 4152 wrote to memory of 4504 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 94 PID 4152 wrote to memory of 4504 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 94 PID 4152 wrote to memory of 4504 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 94 PID 4152 wrote to memory of 3656 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 98 PID 4152 wrote to memory of 3656 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 98 PID 4152 wrote to memory of 3656 4152 a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe"C:\Users\Admin\AppData\Local\Temp\a1a204279d3cdcf73ce14a62268795170aece0aa178c9f18c489d83530b14da5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Stop-Process -Name "msedge"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Stop-Process -Name "firefox"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Stop-Process -Name "firefox"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"2⤵
- Executes dropped EXE
PID:3656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
17KB
MD51a2969cec968310d4e569c9417a4791a
SHA123529e28f00c0989687bacae91b595999ab1534e
SHA2560ec55e6b6bd8e5cf9afda8cd2b1677df6dde5b0c12885bbb2f43f05b42d55518
SHA51223542242b8157ad35bd3d454c161225699dceff1fe68f41996280eb581b196439ff4691910e375e3ca3f93a71216c283767105687a538ce9c3bd30a482b65093
-
Filesize
17KB
MD53f091062175982c8771f33a6f4dc3cce
SHA17cf6e87a218c80d90bdd57d53e1ee77c9127b90b
SHA25609be24ce413cf8a7402bc1f4840f053399b7a4d2646428257d94a6d1dd1d18db
SHA512c1ad48d7732f88300d67e5fbdf1c4bec132747244eb8e678e7f6e37659ea5e81e399283389ccf055b1e15e6f0efbccccc589b44fead2d58678aaae6efd7ab604
-
Filesize
58.2MB
MD541c7c46cfdcccaed611db23a96bd2c99
SHA180f685cd297e68655301107eff8ae85b3574183d
SHA2566ff06b54677d32a26d7230adc14fca1d2e007ae483a156eb801e9d5d82fd5402
SHA512ca714d462b57443958a31b061a8154aff3e2a8003ce6e4e6995536b93954ac32ead0b7a7b6d0385dd95d8a49d75aa4347d2901b2acef466bb5687cef50661615
-
Filesize
58.2MB
MD541c7c46cfdcccaed611db23a96bd2c99
SHA180f685cd297e68655301107eff8ae85b3574183d
SHA2566ff06b54677d32a26d7230adc14fca1d2e007ae483a156eb801e9d5d82fd5402
SHA512ca714d462b57443958a31b061a8154aff3e2a8003ce6e4e6995536b93954ac32ead0b7a7b6d0385dd95d8a49d75aa4347d2901b2acef466bb5687cef50661615
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82