Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2023 15:17

General

  • Target

    d4de12108a068accedd0111d9f929bc9.exe

  • Size

    1.5MB

  • MD5

    d4de12108a068accedd0111d9f929bc9

  • SHA1

    853cbcd7765e9fc3d0d778563d11bb41153e94dd

  • SHA256

    7dfce4f0b796f94bdfe9b151ef14fdad018c8ed02017bf1e26b087f192c4e364

  • SHA512

    77dbc40615bc33f12ed26b23584e11b8e8ad66b408980adf973920a325f01803975ee99afec93b19e4cde14361d027226769f6d82e6fe4a6a56708b455de5ebe

  • SSDEEP

    24576:HxpXPaR2J33o3S7P5zuHHOF2CxfehMHsGKzOYCMEMfX4sZ1Z:Rpy+VDi8rgHfX4sZ/

Malware Config

Signatures

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4de12108a068accedd0111d9f929bc9.exe
    "C:\Users\Admin\AppData\Local\Temp\d4de12108a068accedd0111d9f929bc9.exe"
    1⤵
    • Drops Chrome extension
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3156
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im chrome.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im chrome.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:368
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff860dd9758,0x7ff860dd9768,0x7ff860dd9778
        3⤵
          PID:2728
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:2
          3⤵
            PID:920
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
            3⤵
              PID:3284
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
              3⤵
                PID:3780
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:1
                3⤵
                  PID:4116
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:1
                  3⤵
                    PID:2428
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4604 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
                    3⤵
                      PID:1188
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
                      3⤵
                        PID:5100
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4912 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:1
                        3⤵
                          PID:4756
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5068 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
                          3⤵
                            PID:2388
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5180 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
                            3⤵
                              PID:3684
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
                              3⤵
                                PID:1132
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5312 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
                                3⤵
                                  PID:4536
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:8
                                  3⤵
                                    PID:1228
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 --field-trial-handle=1932,i,8016159815570267575,1380848348950241032,131072 /prefetch:2
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1152
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:3892

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  9881561933a9ddd03990d8f386036c55

                                  SHA1

                                  e06785acf50654a2cb5f8bf38be742ace1af7716

                                  SHA256

                                  f4d1cfb853c41ad14d244ebf317674f086217d7daff097e476fdcfcec5a6bde9

                                  SHA512

                                  fab3be5e9145fca05cb3f176b3d8b77f909806c5341ac52ee71528612a4d50ee3eed7fc095abbe715d1f5b2223b55fc994adfb049ffb70ee2e17a9f49910206d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  371B

                                  MD5

                                  786ab5ea5c7ab9aedc6dfa3c56d1b0f7

                                  SHA1

                                  0d586ba523ddc12a0d443747c210bafc3e51a798

                                  SHA256

                                  2668bd86627d9a9413e96b4fed380fffd0c950aa57ffc88cc04c03772c04adac

                                  SHA512

                                  2b8ffc7fc2e70604c4e119d70d49534cbc688d4021483c76aaf848509f5fdceb234a4ccf82771ce56f0e40bcae344bae42df1980790bef698afe426d1d84fa67

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  df9b351f5c195060fdc581427e12e499

                                  SHA1

                                  cc742c9b65d565a9a610c5df3fc73348b5513f86

                                  SHA256

                                  abd9e237d74df1b5eefa4a004855b9501948da159ace5bd4eede72907e9f59ea

                                  SHA512

                                  8302a6c49ad1ea0f307d77a9b1a3b6b51f4432cd10f2daeb0c7acc71b7d38458631421dabbfcfc1a53b1d9117d1390754cb52ada2a555da1adce46c661afc367

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  bf67ed391e662072ecc236b5fcb0742c

                                  SHA1

                                  6a8b5792fae98c58ff6412f9dc9c884281f014f4

                                  SHA256

                                  201ebe153f8ca286318269379577588a09ec00d0cf37cc83af6443da01f3b0c3

                                  SHA512

                                  6b3070e55b029f69812ac95b87e6afe1b8d5e9e3067da72e1e2fd2228c56daed17862d47b451e88a996b090c8b4d07283e646d443432daff32035a6fe179c101

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  18KB

                                  MD5

                                  09b64de2016c584c9524825667e58e80

                                  SHA1

                                  435ba98e621d86103d998e31f70976dfda330aa0

                                  SHA256

                                  1e020a4763865ad20fe95d6d6020f17e88086e5199c8e9f78d585ad8fb05f297

                                  SHA512

                                  2a905665c6b6604e291b6721fcc88c851ffcec483545deb21b91554dd0b38a18e4a2d724c519423ea954d48b32726fd91b317eaa27e08c5617b25d2b085dc1f3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  18KB

                                  MD5

                                  4822bdf325ceef2fa1cbd1cc406db879

                                  SHA1

                                  9f8cb61e7586e40087e4c854dcf96589238718d6

                                  SHA256

                                  ad3ec5c2d905171524b6eb66476a4489a3fbe3737fd16e607f914724af42be9c

                                  SHA512

                                  50e3b2e63889548576415ce8261400026f88965508317a69b049d1f8c4142f7497009cbd18a507cce3fbd79bea0d650e85591e2bdf47491c63c76a8df1eaf7c5

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  224KB

                                  MD5

                                  b60b3afbef2cd7a4c538cb00df624190

                                  SHA1

                                  f31b26fd6d84962b619f420b8fcbe13c8016f86a

                                  SHA256

                                  f4bf0751033c4ff68fde5dc3bd9af0a28b51271beaeb45f3e5492e94293847a1

                                  SHA512

                                  4b3fed199a2e9430fd7efe1ad8bc4f917e688ed880d009a1295c97f6966d3c2f5c8f0642b6d9cbabe9b47796d0fa71ccb5cc888fa4503735692c9a0cc009bc2a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd