Analysis

  • max time kernel
    138s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2023 01:34

General

  • Target

    301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff.exe

  • Size

    158.0MB

  • MD5

    66968df71661f2397a646e38348222b8

  • SHA1

    3489b89565130e064482249de5707fee3fe5673a

  • SHA256

    301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff

  • SHA512

    66ea44ce5e87ca9599c9f4257f816eb58bd929800f55107b490ec2f0fcc32a95b4c5d2e90d2ac6b6878f38b51daca7529d877682719ee8918631b8a6c5fc382a

  • SSDEEP

    1572864:YWarxc6cX72VubK8xidgzvKeh0ew1988ae7XRuiRU2B:XbK8xiwiyiR1

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff.exe
    "C:\Users\Admin\AppData\Local\Temp\301caec2769daa002d3d7f6408d24afa564fa59edd2033cb2962649754837bff.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "msedge"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1388
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:624
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:840
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      PID:680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    658a03f463d834b049174ff23b7a2c5f

    SHA1

    94d1fb641bc22a8e5c1d44728330c38735dc1924

    SHA256

    c2df74ca6cd98865b39f5c41edcc3d447a48a43d6f8a101578feae0edb3e46f0

    SHA512

    51303c13a2794e7334d6a709d8f60569b34471bd4d8e73cf3b832debf251b5a68ea717754a2194f54c624d8f1a95bfb84ed75c08c22d190b977095cff355a797

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    f654dbe9ef0d7723435789921e351750

    SHA1

    45e9628f8aa772ebf406c1007c5d27302aa004c5

    SHA256

    3cc90a7e720ae2faeb022df185f9fdf424543a52811a68906f41ef174e63a140

    SHA512

    831095c0e233e112416613103b45446ada83158a0c4846e61b20d235063d62e582a1f826754831449e4b45ca7ecb9476f583833409b8dd3e570ca3e3bf9c64c4

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    77a0f6ab4a09f253a68ee7ab25319d0a

    SHA1

    4af8fceaa7ac5556ea47805cf6216ce153a504fd

    SHA256

    c2044a1b50f49bc71ed7c768f14b8854abde34c4fa9a4ec0c6942c883fd339f3

    SHA512

    5e3da5289acbf1d22713e11bb6521315051f8198a1ee6d0ba09b9d4b6080e3892c10bb80b9784fd7740c00da213e8efd87970f2093a7f1ad8be28d87ca5e4a26

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    77a0f6ab4a09f253a68ee7ab25319d0a

    SHA1

    4af8fceaa7ac5556ea47805cf6216ce153a504fd

    SHA256

    c2044a1b50f49bc71ed7c768f14b8854abde34c4fa9a4ec0c6942c883fd339f3

    SHA512

    5e3da5289acbf1d22713e11bb6521315051f8198a1ee6d0ba09b9d4b6080e3892c10bb80b9784fd7740c00da213e8efd87970f2093a7f1ad8be28d87ca5e4a26

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ekuicwom.vuw.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/624-182-0x0000000004840000-0x0000000004850000-memory.dmp

    Filesize

    64KB

  • memory/624-184-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB

  • memory/624-171-0x0000000005700000-0x0000000005A54000-memory.dmp

    Filesize

    3.3MB

  • memory/624-170-0x0000000004840000-0x0000000004850000-memory.dmp

    Filesize

    64KB

  • memory/624-169-0x0000000004840000-0x0000000004850000-memory.dmp

    Filesize

    64KB

  • memory/624-168-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB

  • memory/680-278-0x0000000000210000-0x0000000000A53000-memory.dmp

    Filesize

    8.3MB

  • memory/680-280-0x0000000000210000-0x0000000000A53000-memory.dmp

    Filesize

    8.3MB

  • memory/840-199-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/840-188-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/840-187-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/840-186-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB

  • memory/840-201-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB

  • memory/1388-131-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB

  • memory/1388-133-0x0000000005430000-0x0000000005440000-memory.dmp

    Filesize

    64KB

  • memory/1388-157-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB

  • memory/1388-154-0x0000000008150000-0x00000000086F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1388-153-0x0000000006E20000-0x0000000006E42000-memory.dmp

    Filesize

    136KB

  • memory/1388-152-0x0000000006DD0000-0x0000000006DEA000-memory.dmp

    Filesize

    104KB

  • memory/1388-151-0x0000000007B00000-0x0000000007B96000-memory.dmp

    Filesize

    600KB

  • memory/1388-150-0x0000000005430000-0x0000000005440000-memory.dmp

    Filesize

    64KB

  • memory/1388-149-0x0000000006940000-0x000000000698C000-memory.dmp

    Filesize

    304KB

  • memory/1388-148-0x0000000006900000-0x000000000691E000-memory.dmp

    Filesize

    120KB

  • memory/1388-147-0x0000000006500000-0x0000000006854000-memory.dmp

    Filesize

    3.3MB

  • memory/1388-142-0x0000000006280000-0x00000000062E6000-memory.dmp

    Filesize

    408KB

  • memory/1388-136-0x0000000006210000-0x0000000006276000-memory.dmp

    Filesize

    408KB

  • memory/1388-135-0x0000000005A30000-0x0000000005A52000-memory.dmp

    Filesize

    136KB

  • memory/1388-130-0x0000000005310000-0x0000000005346000-memory.dmp

    Filesize

    216KB

  • memory/1388-134-0x0000000005A70000-0x0000000006098000-memory.dmp

    Filesize

    6.2MB

  • memory/1388-132-0x0000000005430000-0x0000000005440000-memory.dmp

    Filesize

    64KB

  • memory/2200-63-0x000000000B680000-0x000000000B68C000-memory.dmp

    Filesize

    48KB

  • memory/2200-31-0x000000000B6F0000-0x000000000B795000-memory.dmp

    Filesize

    660KB

  • memory/2200-64-0x000000000C0E0000-0x000000000C11A000-memory.dmp

    Filesize

    232KB

  • memory/2200-39-0x000000000B7A0000-0x000000000B7F4000-memory.dmp

    Filesize

    336KB

  • memory/2200-40-0x000000000B800000-0x000000000B896000-memory.dmp

    Filesize

    600KB

  • memory/2200-60-0x000000000B680000-0x000000000B68C000-memory.dmp

    Filesize

    48KB

  • memory/2200-59-0x00000000076B0000-0x00000000076B6000-memory.dmp

    Filesize

    24KB

  • memory/2200-56-0x00000000076B0000-0x00000000076B6000-memory.dmp

    Filesize

    24KB

  • memory/2200-55-0x000000000B6D0000-0x000000000B6E2000-memory.dmp

    Filesize

    72KB

  • memory/2200-52-0x000000000B6D0000-0x000000000B6E2000-memory.dmp

    Filesize

    72KB

  • memory/2200-51-0x000000000B690000-0x000000000B6CC000-memory.dmp

    Filesize

    240KB

  • memory/2200-48-0x000000000B690000-0x000000000B6CC000-memory.dmp

    Filesize

    240KB

  • memory/2200-47-0x000000000B8A0000-0x000000000B91A000-memory.dmp

    Filesize

    488KB

  • memory/2200-44-0x000000000B8A0000-0x000000000B91A000-memory.dmp

    Filesize

    488KB

  • memory/2200-43-0x000000000B800000-0x000000000B896000-memory.dmp

    Filesize

    600KB

  • memory/2200-36-0x000000000B7A0000-0x000000000B7F4000-memory.dmp

    Filesize

    336KB

  • memory/2200-35-0x0000000007660000-0x0000000007675000-memory.dmp

    Filesize

    84KB

  • memory/2200-0-0x00000000076C0000-0x0000000008049000-memory.dmp

    Filesize

    9.5MB

  • memory/2200-32-0x0000000007660000-0x0000000007675000-memory.dmp

    Filesize

    84KB

  • memory/2200-28-0x000000000B6F0000-0x000000000B795000-memory.dmp

    Filesize

    660KB

  • memory/2200-27-0x000000000B9A0000-0x000000000BCF6000-memory.dmp

    Filesize

    3.3MB

  • memory/2200-23-0x0000000007550000-0x0000000007580000-memory.dmp

    Filesize

    192KB

  • memory/2200-24-0x000000000B9A0000-0x000000000BCF6000-memory.dmp

    Filesize

    3.3MB

  • memory/2200-20-0x0000000007550000-0x0000000007580000-memory.dmp

    Filesize

    192KB

  • memory/2200-19-0x000000000B4B0000-0x000000000B63E000-memory.dmp

    Filesize

    1.6MB

  • memory/2200-16-0x000000000B4B0000-0x000000000B63E000-memory.dmp

    Filesize

    1.6MB

  • memory/2200-15-0x0000000007140000-0x0000000007168000-memory.dmp

    Filesize

    160KB

  • memory/2200-12-0x0000000007140000-0x0000000007168000-memory.dmp

    Filesize

    160KB

  • memory/2200-11-0x0000000007060000-0x000000000707D000-memory.dmp

    Filesize

    116KB

  • memory/2200-242-0x0000000000C50000-0x000000000149F000-memory.dmp

    Filesize

    8.3MB

  • memory/2200-8-0x0000000007060000-0x000000000707D000-memory.dmp

    Filesize

    116KB

  • memory/2200-6-0x0000000000C50000-0x000000000149F000-memory.dmp

    Filesize

    8.3MB

  • memory/2200-4-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2200-279-0x0000000000C50000-0x000000000149F000-memory.dmp

    Filesize

    8.3MB

  • memory/2200-3-0x00000000076C0000-0x0000000008049000-memory.dmp

    Filesize

    9.5MB