Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
1a3d5d5741d2246c11e4408bd44b0c88.exe
Resource
win7-20231215-en
General
-
Target
1a3d5d5741d2246c11e4408bd44b0c88.exe
-
Size
2.4MB
-
MD5
1a3d5d5741d2246c11e4408bd44b0c88
-
SHA1
6b5b2972f29370aa6f04514f38759c847df7b721
-
SHA256
56b5f06c9a2b7af8d7bcfea532fae079ba998b8a6438773e6992651d92bf23e2
-
SHA512
481f9ef8f91a758e5f7a72fca404cabe8ae20795dc8d5c6f82dfccf071658fa964e513ac3b46392eba2db4ea96ec06dddf4ed77c5d45fd20e17b4630be6b56af
-
SSDEEP
49152:p6KbRx0jGIxqd0qW9BT2H6zslW559lR1pr/PLrBqx/LUz3z:p6d7v0W5lR1x3v0/Iz3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation extensions.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation WinPump.exe -
Executes dropped EXE 5 IoCs
pid Process 3744 extensions.exe 1536 WinPump.exe 4108 BABYLON.exe 2088 Setup.exe 1924 pumpa.exe -
Loads dropped DLL 3 IoCs
pid Process 2088 Setup.exe 2088 Setup.exe 2088 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPageShow = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9} Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}\DisplayName = "Search the web (Babylon)" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}\URL = "http://search.babylon.com/web/{searchTerms}?babsrc=browsersearch&AF=18836" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}" Setup.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://search.babylon.com/home?AF=18836" Setup.exe -
Modifies registry class 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\TEST.CAP Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Test.cap Setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1536 WinPump.exe 1536 WinPump.exe 2088 Setup.exe 2088 Setup.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe 1536 WinPump.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2088 Setup.exe Token: SeTakeOwnershipPrivilege 2088 Setup.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1536 WinPump.exe 1536 WinPump.exe 4108 BABYLON.exe 2088 Setup.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3864 wrote to memory of 3744 3864 1a3d5d5741d2246c11e4408bd44b0c88.exe 90 PID 3864 wrote to memory of 3744 3864 1a3d5d5741d2246c11e4408bd44b0c88.exe 90 PID 3864 wrote to memory of 3744 3864 1a3d5d5741d2246c11e4408bd44b0c88.exe 90 PID 3864 wrote to memory of 1536 3864 1a3d5d5741d2246c11e4408bd44b0c88.exe 93 PID 3864 wrote to memory of 1536 3864 1a3d5d5741d2246c11e4408bd44b0c88.exe 93 PID 3864 wrote to memory of 1536 3864 1a3d5d5741d2246c11e4408bd44b0c88.exe 93 PID 3744 wrote to memory of 4108 3744 extensions.exe 91 PID 3744 wrote to memory of 4108 3744 extensions.exe 91 PID 3744 wrote to memory of 4108 3744 extensions.exe 91 PID 4108 wrote to memory of 2088 4108 BABYLON.exe 94 PID 4108 wrote to memory of 2088 4108 BABYLON.exe 94 PID 4108 wrote to memory of 2088 4108 BABYLON.exe 94 PID 1536 wrote to memory of 1924 1536 WinPump.exe 96 PID 1536 wrote to memory of 1924 1536 WinPump.exe 96 PID 1536 wrote to memory of 1924 1536 WinPump.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a3d5d5741d2246c11e4408bd44b0c88.exe"C:\Users\Admin\AppData\Local\Temp\1a3d5d5741d2246c11e4408bd44b0c88.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\WinPump\extensions.exeC:\Users\Admin\AppData\Roaming\WinPump\extensions.exe /aff=901 /saff=1318 /affilID=362⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\BABYLON.exe"C:\Users\Admin\AppData\Local\Temp\BABYLON.exe" -affilID=18836 -s3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\Setup.exe"C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\Setup.exe" -affilID=18836 -s4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
-
-
C:\Users\Admin\AppData\Roaming\WinPump\WinPump.exe"C:\Users\Admin\AppData\Roaming\WinPump\WinPump.exe" ""2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Roaming\WinPump\pumpa.exe"C:\Users\Admin\AppData\Roaming\WinPump\pumpa.exe"3⤵
- Executes dropped EXE
PID:1924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5af537180fcb1b8942a1fe2463caecbe1
SHA1804193ee993e8304194f6dce19b17da4ac24cfc3
SHA2560ed414c6bfde7b39b88d299063464dbc9b47cd36471610436552289b6f4ab4e6
SHA512769f12fbe8c3021dada5ab552838dd39474a964a3e999dcb7c9442834e940492ab239fdf99bd9c07a82991e90d8b5503c9fb04acd618984aef2d51b3c2464ac1
-
Filesize
3KB
MD55e6230b3b16798e23720958756ac6d9e
SHA1c7bcb001c48a67d4c9d6e70e92473ebd85b30585
SHA256d49ec47f5d27a09a17e00a6eb78f49a761c9f5881ec81fb07cc49fd0a5f287b2
SHA5126b1c132f0e4fc2ca6b5e8d807671c586d84e044e4db8380682fd4d071160177c0f7e7a6afae3ee74a4fbd5c65aca0c0876948f5a42deafdbb685c5b7989b5aae
-
Filesize
31KB
MD59b3cc3b7ddf59423fe36f4837851922b
SHA157f5b8f2def254c79fa9b42a98383edef436aabf
SHA256a3b907536cf20290463906b16cf733f210411ecd2c1ff669b37dc4677c5dc297
SHA512df103aa39ab7a69a8f56c26687519574f93d73a6ec7310faea86732fde8672d41383cddb15b917c73dc629371eb15810e91ad5f0ad6b140698bde1506819ee2b
-
Filesize
8KB
MD56a27bf497eb5866cffd830b2e96fb6e3
SHA1ecffae109315fa369124aca89bb3f06aa5641cc4
SHA256abece4cefcd05ace8c7c259d4ad02b6fb0c3fd73b2e71b15ca7bc6069720f865
SHA5127224e4882e4493d46584a035a5c9e7096e5fa02564f2082b4faa486501a5dfd5d01b2bbd0c142452bf86bff9b4d21f835f959f0a47d20c352bcdcb21eb597ccf
-
Filesize
3KB
MD5a27604c227594fe55d675ee8b33b24b4
SHA12dcd17dad62487b90635e4b2777a59e7da46c3cd
SHA25618aeea6f08694af5244b2e6f2ee5d9971a8082b285439e38eb2ba3f2b9ec8eba
SHA512dc611b2789b6b6694271e08750f4ebc037ad3ac9784f17a33c180f27fdb800d650a0b6fa5e062b9521c799f7d316619f704aa51da15db5306f9fdf14193b5336
-
Filesize
92KB
MD5d74d045d60c447d10238976c12419ee6
SHA1aa145b66b5dc4db16835ee9a50817ff0f6052507
SHA25653e6ad2228c7484edac83f120c21eed064b7112c82cb7f3f93bf7626a5aee3cf
SHA51251e7aba40dbc184a52d776c578403b5d26aceb5a6bf1829846f53e0ab6e97cc7c82776391698ba231cc1666d7a033f6008f3b0a7b5a5044731e8c4fe81250447
-
Filesize
73KB
MD5ac3e0db52a3d8308708b1b52fc53fefd
SHA1dcf0691fc8e75036cd9a233d57bda86c1a30b943
SHA256650497d7f34291a75da005014179db3fca5d4c569d2fb49acdd9f4618f52b098
SHA51276041348d439ce92e1f8a9efd73418c93df065d069924aebfb375ef83e388c2fbf6196f757c8b19131f4bc5703fac7b7840eb04d3b1551525b2bbb08dcc6088c
-
Filesize
131KB
MD50eb3938d85071e9873bd5dba018f2a60
SHA1155282c430490d4fdfc9662cf3519436db575982
SHA25672608c77e4813884bf52ce8330dac544e847bc47e9209e3fe0ecfafd8ee798a4
SHA5128fcc74a483e5f369a5f753661a267472960883f301c3115d1cda51973323819750b717c6df8943966506df15d809fb19964ac5a350f1017f9c710777c01d579e
-
Filesize
127KB
MD5e7b643efa27d0a6acebade517294732c
SHA19cecb4d2f2ec5031fbfb3394133bb71b55a26607
SHA256d471450cf765c735e08e37988fba7d21e641060b7a4c8ddf1bdf87bd29b099d1
SHA51295235e13f2240beed6de9ee324864cfe51855d64a372af7b91c9d1f9675229bf4f01e02540dc39f912adba3ea18de5d797cf4f4dd7b8bc7dcd8612eedff92851
-
Filesize
78KB
MD5eec98c239675f4a070505c98ae98f766
SHA144c07a72e0d6ec4e004375ec7599f4db4090faeb
SHA256ae0b1eda9edcac4d7b37c4affb2f146c1931a1e13d121883e7c51f74132e657d
SHA512dd0e6296208c29e57f5539a86a12bd59627dc568ff3c2c2b1fd7418a79efde6b22f001d9ce8d96c9c1916377d1dcc94c0ac6df52fdb6f76a923760b4773068d0
-
Filesize
10KB
MD555d46ea4db2b02f1efe85a39813aad8b
SHA10715de98f95a4d02efaa627759d3aebca0a71234
SHA256fe42637b0157aed3e4d129280e74bbecfd05336f28ba8d036bd61e48242051ae
SHA5125b53926c7fa8a0cc581a3dcae0e6d7e052729aecef1f673c7750166409b51eb530da1e2d7b5d98632dad6c254f7096470bdfe88198a944f57637ce924112d106
-
Filesize
108KB
MD5aa8b1a869fb07cb59671a1a65888683c
SHA1e846c2c65b5ef72610f47631057bba7664ea7c3e
SHA256c75359ec25cbc8c531ffbdf76c5ee9c90c7620a62e63d6fb1de9a96dbd8d860b
SHA512055eedcc67c7e87872da49402b941f0589dbd53abeb248a9133d818e16a311faf3e7bb34000dd6c2e0ef4db91f650cfefe077dde39e7b9a9064396e3712f09bf
-
Filesize
48KB
MD586879c84ee35d8b09fb8bd2cc60bcdc1
SHA1a64023dc68c8d1195018c2b7bcb8428a6015a34e
SHA256393a2c83f6a4c99a6fbca5e8ed045d8cfb5469a5dda6cc3482e1d595825dcfb9
SHA51228f76d906096faf2dc1b913eddb3bf94ead70a2c9254a0a574b28acb174ef0da5946acfca1fc1ac4fa3569cbb36a9804e06a6c7f84dcbe701c91b0db81fb4a39
-
Filesize
101KB
MD598c96f608da5f33751f692d152ee2c9c
SHA17c5921f319c8483885df6d59648c5ad4b3b186f3
SHA256e02027c83f47a259a00ef3d03a58036f3dcb76e118b09046fb89c02678fdf004
SHA5122ae0a3e8fb16641609e76e207ed9196c9a7ed45d11d5579e0099c73787ddcd050e2ffa1eba926114acb0d0847f7b18088ffd898f240d9ec34e72f428a1b22768
-
Filesize
49KB
MD5e502e1bbc4e2d7e0433981f1b0b6f19b
SHA108e4cc3759f23ad2f4c221047aa31cd15f32da45
SHA25601ff567bba66f5cdf20c5c6d357bcde1a8be73d6b207cf3d2fb194f77f0c2c83
SHA512872b472d81b3720a14b004d73209ee7a4f150c017a83af65e50d2af13f89d66246db01d2eeda76e55cc43606829c443738a997b4735c8478b0a9c56a0bd915e6
-
Filesize
189B
MD531b0a6106458ffd1646b92282af8c742
SHA10ff54058a685435264b74e94dc497a434ab41237
SHA2566871f6258fccc0a9fff017c92bb82af9f293ced44b93a7eece34acd8eb884278
SHA51276d7b2a05917ed32d50c392e541397b2f8bedec5c849b0953ab35d5bd3d9287abcb78b8c176ea1a4b981f791687e1e1104efcaad7b9a3bb647494487f4ae7905
-
Filesize
200B
MD5b72f738ba66d4c371c4f5b25a5f25503
SHA105a9bb2ba88edf6f6260d3cab54a42d5a6bcdcdc
SHA256ea2304b496b98ef6f458318a29b1596991579e61c1695d2c98351d5849343a67
SHA51262b43a890f285e69aa6e214fc2fc5e124a2192b0d5e61f569261c424d1fef755d7db5aa311c473ab76aa03c703b8937dcca8a03780daf8a959e6246bb79e51b8
-
Filesize
192B
MD59d291922f477f4ab11c5a3d96def52d3
SHA1625cf2c2898bdd75d7f4c3c078d964d69accde0f
SHA256d0a32dc13f8763a15caea1ceb7ed0737ee0c3c5f055d9f552717548dc9bdca40
SHA512897501bc61988c7f62b745f70018e5236dec3d702a09ff12fc76096b82321fb2add08d4f482ea89e2b9003a2792d4477dba40b2ce090bb29458f71fce78880ce
-
Filesize
443B
MD5a4d79e56d805465ac8a3644c6db6a764
SHA1290bcd94a932d6800c3e8631e8c2c2253b8016db
SHA256ac1952944dd876ea4e383b38bbd1c6e847455744c3cafd139f4a4b91125d4f49
SHA51206a9dce0923e18e32f7b1ea41a39b58dcddccc9911644ebcd906fd97316a6628436bb54d7abcba02edc1dde4788c0aaad49d3aa3b0a9822781a9412c7b67be72
-
Filesize
50KB
MD5aec2b27c492b480b430e1f874be2f433
SHA12ca58643fd0c4e12dabdcaa92e9eab50b904de2b
SHA256fff76c7555cb639188971506f65fb0d3fcc3d8e25e496267fc3f6ae586147b18
SHA512e7586384d87601c2e6076c237236d70c28312ee182791d9ab92f1ac5ba6971eeb79ce2b8a895516f3e8e6157e08151cfc457637c31ad8815123f588cc4186cc5
-
Filesize
40KB
MD5d31bec51bde60c8243d912e00fd0d18b
SHA174ac6000964a1b2a2d30c3dab0ccfa6e8fdbacd5
SHA256d2de560a98ab8cd7b72fea2a39d6f3ae427d35ca2feef2ddf95507c77c00331a
SHA51241150f5090438829710f52920c816df89fd403a3f46ab5e161c5d240f05b7a8bf786f0258df7683e0672a165fd2d62bf350f393bb8612c323d9917faeb3c57ce
-
Filesize
68KB
MD5143fe50b09d03cc70bf79c944eded93e
SHA128ae3b991e6d94131380615ef0a5ba23ad797c18
SHA2560b786af33938ca15863b98b19ad16ad60e3d4794aa777cdd7c05af4859644d87
SHA51260f419683226ccf25f4e5dfd892708984d6beaebe6ee42b863456e125a70879558bf6b21dd7d6ff4fa1ccb219997a682dd5181a288a2ff8f0c61f479d994332f
-
Filesize
40KB
MD5eeba704b65c2f1b991ca454c0b9ba056
SHA1e008585bb09d38979c987c66c27f9b4985d55ae8
SHA256649b6cdf261339d697fb417cb34c7a66b46749c38d2284dadc3a5a274064a240
SHA5123ddb03cfbac15b8f53e1f5c7c829bf6fd33a745f75c6dea69556b2945ce3b9ca4f5a8da287effa01561bc2848c6c53c861f2a60543ca1481f2387d909dc794f6
-
Filesize
104KB
MD511d17e7c5e531b6fa16f5b4062a0983b
SHA15804502bb8e20d0667123a8e9ec54429b9e23a8a
SHA2561dc66b7cff1a01a22bc9640fec38baf848e2d873c848497291b77fbf7080c86a
SHA51299d18bbdeb362f095cd49c4bae9602930b3567e7ebf5246c6493be8079c5ebba6e0ea046fa7758a490908fcef41f3ed9e0b542d7bc2f501bde16da7f5caa81c7
-
Filesize
107KB
MD5af5333eb55677cc7536fb862a5ee9da5
SHA159012773719e5fb1698fe7fd9e59e69ca00e3690
SHA2562765787f0ff3d3d9c5649423cb3e8c1d2419afda581fadcc578c317d53fc7f70
SHA51249a08cbec8968e313ac5c81cd8da20ed5efe87f440b50d10ba31ed1ac273eb6f5592a1813cf868105e022abea7782bb5dcce3c81c47803c66df63a538c18f897