Analysis

  • max time kernel
    127s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2023 02:07

General

  • Target

    6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772.exe

  • Size

    157.7MB

  • MD5

    2f010a1eb3eb549502c640fdf068067b

  • SHA1

    d2dd90bfadff4ff0e73884f3e47132d1bc376f56

  • SHA256

    6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772

  • SHA512

    c819470c209dae93c2dd7616aa342aa30dc2fabdfb8d0afb408cc9199424ef18765a7f269690ca3307291475a8c232b159b004208626f4991b71f0c3dc73dcc2

  • SSDEEP

    1572864:1Wajz7MJ2NMyKfflSuPtvKeh0ew1988ae7XRuiRU2b:oKQ2NMD9L1iyiRv

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772.exe
    "C:\Users\Admin\AppData\Local\Temp\6625bd4b26d018dde4f1727ad9cd66112375b01efe51216e002186e543aaf772.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "msedge"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2264
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2956
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4952
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    0a247b69310d66797c470391043303fb

    SHA1

    befd83722be3dd1f4c378c82cdf66184b81eaede

    SHA256

    3b20e09f0c0b50cc00945dd23222d32257d153383ac3ff79f3c6f54dcea7c164

    SHA512

    588af0996b986e9b70c5b9d8b9a3576a5528f0900a5f86b0022ebc0d255105bf7851437513ae4aff588abe67e6bc2089ff684d16e84643b4a5ad86f978fcecfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    57a39a887201911b93b70f430c51d2e7

    SHA1

    42e94fd2d6cb9fe4ff95827fc254140c8af6f70a

    SHA256

    7ed297ea062923153e05712602300060a9f3fb001e15dd165c523e10cdd6b030

    SHA512

    25a80392e73e2a34691f99cf22b0db41566fdb023fbacfd18e2b98fd176191dacdd45cc3b4ae089b5c262b8be13de217f6e20e32436db3929e5008657c63acff

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    ab5a0c4dfd4e40048c92943354afa758

    SHA1

    aba2064e4349fd38c7178de3a8c453894a6b2ec1

    SHA256

    4bc57f4a1419ee1539165bfefbf4448c23c0e5b248b1e759f5ce62215b38be87

    SHA512

    d3030835b48c952319242a7884994f3e91f3578a50d5b9caea9f38f6a3eb1f5d74d21ca4ed79a89d02872888a832a99b71ff1b85ea2a6c4c09b43cf3a93b5402

  • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe

    Filesize

    58.2MB

    MD5

    ab5a0c4dfd4e40048c92943354afa758

    SHA1

    aba2064e4349fd38c7178de3a8c453894a6b2ec1

    SHA256

    4bc57f4a1419ee1539165bfefbf4448c23c0e5b248b1e759f5ce62215b38be87

    SHA512

    d3030835b48c952319242a7884994f3e91f3578a50d5b9caea9f38f6a3eb1f5d74d21ca4ed79a89d02872888a832a99b71ff1b85ea2a6c4c09b43cf3a93b5402

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vwumt5bm.55r.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1668-281-0x0000000000D60000-0x00000000015A3000-memory.dmp

    Filesize

    8.3MB

  • memory/1668-280-0x0000000000D60000-0x00000000015A3000-memory.dmp

    Filesize

    8.3MB

  • memory/2264-158-0x00000000735F0000-0x0000000073DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2264-131-0x00000000735F0000-0x0000000073DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2264-155-0x0000000007320000-0x00000000078C4000-memory.dmp

    Filesize

    5.6MB

  • memory/2264-154-0x0000000005FC0000-0x0000000005FE2000-memory.dmp

    Filesize

    136KB

  • memory/2264-153-0x0000000005F70000-0x0000000005F8A000-memory.dmp

    Filesize

    104KB

  • memory/2264-152-0x0000000006CD0000-0x0000000006D66000-memory.dmp

    Filesize

    600KB

  • memory/2264-151-0x0000000004570000-0x0000000004580000-memory.dmp

    Filesize

    64KB

  • memory/2264-150-0x0000000005AD0000-0x0000000005B1C000-memory.dmp

    Filesize

    304KB

  • memory/2264-149-0x0000000005AB0000-0x0000000005ACE000-memory.dmp

    Filesize

    120KB

  • memory/2264-144-0x00000000054A0000-0x00000000057F4000-memory.dmp

    Filesize

    3.3MB

  • memory/2264-138-0x0000000005430000-0x0000000005496000-memory.dmp

    Filesize

    408KB

  • memory/2264-137-0x00000000053C0000-0x0000000005426000-memory.dmp

    Filesize

    408KB

  • memory/2264-136-0x0000000004AF0000-0x0000000004B12000-memory.dmp

    Filesize

    136KB

  • memory/2264-135-0x0000000004BB0000-0x00000000051D8000-memory.dmp

    Filesize

    6.2MB

  • memory/2264-134-0x0000000004570000-0x0000000004580000-memory.dmp

    Filesize

    64KB

  • memory/2264-133-0x0000000002150000-0x0000000002186000-memory.dmp

    Filesize

    216KB

  • memory/2264-132-0x0000000004570000-0x0000000004580000-memory.dmp

    Filesize

    64KB

  • memory/2956-172-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2956-169-0x00000000735F0000-0x0000000073DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2956-186-0x00000000735F0000-0x0000000073DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2956-184-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2956-182-0x0000000005A80000-0x0000000005DD4000-memory.dmp

    Filesize

    3.3MB

  • memory/2956-170-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/3708-41-0x000000000B140000-0x000000000B1D6000-memory.dmp

    Filesize

    600KB

  • memory/3708-0-0x0000000006F10000-0x0000000007899000-memory.dmp

    Filesize

    9.5MB

  • memory/3708-49-0x0000000006ED0000-0x0000000006F0C000-memory.dmp

    Filesize

    240KB

  • memory/3708-48-0x000000000B1E0000-0x000000000B25A000-memory.dmp

    Filesize

    488KB

  • memory/3708-45-0x000000000B1E0000-0x000000000B25A000-memory.dmp

    Filesize

    488KB

  • memory/3708-44-0x000000000B140000-0x000000000B1D6000-memory.dmp

    Filesize

    600KB

  • memory/3708-52-0x0000000006ED0000-0x0000000006F0C000-memory.dmp

    Filesize

    240KB

  • memory/3708-40-0x000000000ADF0000-0x000000000AE44000-memory.dmp

    Filesize

    336KB

  • memory/3708-37-0x000000000ADF0000-0x000000000AE44000-memory.dmp

    Filesize

    336KB

  • memory/3708-36-0x0000000006EA0000-0x0000000006EB5000-memory.dmp

    Filesize

    84KB

  • memory/3708-16-0x00000000068D0000-0x00000000068F8000-memory.dmp

    Filesize

    160KB

  • memory/3708-33-0x0000000006EA0000-0x0000000006EB5000-memory.dmp

    Filesize

    84KB

  • memory/3708-32-0x000000000AFF0000-0x000000000B095000-memory.dmp

    Filesize

    660KB

  • memory/3708-29-0x000000000AFF0000-0x000000000B095000-memory.dmp

    Filesize

    660KB

  • memory/3708-28-0x000000000B350000-0x000000000B6A6000-memory.dmp

    Filesize

    3.3MB

  • memory/3708-25-0x000000000B350000-0x000000000B6A6000-memory.dmp

    Filesize

    3.3MB

  • memory/3708-24-0x0000000006E40000-0x0000000006E70000-memory.dmp

    Filesize

    192KB

  • memory/3708-21-0x0000000006E40000-0x0000000006E70000-memory.dmp

    Filesize

    192KB

  • memory/3708-20-0x000000000AE60000-0x000000000AFEE000-memory.dmp

    Filesize

    1.6MB

  • memory/3708-64-0x000000000B0E0000-0x000000000B0EC000-memory.dmp

    Filesize

    48KB

  • memory/3708-13-0x00000000068D0000-0x00000000068F8000-memory.dmp

    Filesize

    160KB

  • memory/3708-61-0x000000000B0E0000-0x000000000B0EC000-memory.dmp

    Filesize

    48KB

  • memory/3708-60-0x000000000B0F0000-0x000000000B0F6000-memory.dmp

    Filesize

    24KB

  • memory/3708-171-0x00000000002F0000-0x0000000000B18000-memory.dmp

    Filesize

    8.2MB

  • memory/3708-17-0x000000000AE60000-0x000000000AFEE000-memory.dmp

    Filesize

    1.6MB

  • memory/3708-57-0x000000000B0F0000-0x000000000B0F6000-memory.dmp

    Filesize

    24KB

  • memory/3708-12-0x00000000068A0000-0x00000000068BD000-memory.dmp

    Filesize

    116KB

  • memory/3708-56-0x000000000B100000-0x000000000B112000-memory.dmp

    Filesize

    72KB

  • memory/3708-53-0x000000000B100000-0x000000000B112000-memory.dmp

    Filesize

    72KB

  • memory/3708-3-0x0000000006F10000-0x0000000007899000-memory.dmp

    Filesize

    9.5MB

  • memory/3708-5-0x0000000006980000-0x0000000006A27000-memory.dmp

    Filesize

    668KB

  • memory/3708-279-0x00000000002F0000-0x0000000000B18000-memory.dmp

    Filesize

    8.2MB

  • memory/3708-9-0x00000000068A0000-0x00000000068BD000-memory.dmp

    Filesize

    116KB

  • memory/3708-4-0x00000000002F0000-0x0000000000B18000-memory.dmp

    Filesize

    8.2MB

  • memory/3708-8-0x0000000006980000-0x0000000006A27000-memory.dmp

    Filesize

    668KB

  • memory/4952-203-0x00000000735F0000-0x0000000073DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/4952-201-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB

  • memory/4952-190-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB

  • memory/4952-189-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB

  • memory/4952-188-0x00000000735F0000-0x0000000073DA0000-memory.dmp

    Filesize

    7.7MB