Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 02:50

General

  • Target

    c6312e4be6550dc996a8f4c5992f127d6c6bd55e740eb3d214c909c2e91b811a.exe

  • Size

    1.8MB

  • MD5

    521bab79e07c866d365f0f9d896c7801

  • SHA1

    d5692919a16ae470053e7db18ac964a63b5dbeaa

  • SHA256

    c6312e4be6550dc996a8f4c5992f127d6c6bd55e740eb3d214c909c2e91b811a

  • SHA512

    3372e72e6fcc66e96fd3711e7d999be920bcefb9cc0dbf7cc1753098f72cf98302cbfedd5fdc8a21b02ed9bc470be57da024b93a5cf1efb1335b4868567fde88

  • SSDEEP

    49152:bKJ0WR7AFPyyiSruXKpk3WFDL9zxnSB/snji6attJM:bKlBAFPydSS6W6X9lnKEnW6at

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 37 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6312e4be6550dc996a8f4c5992f127d6c6bd55e740eb3d214c909c2e91b811a.exe
    "C:\Users\Admin\AppData\Local\Temp\c6312e4be6550dc996a8f4c5992f127d6c6bd55e740eb3d214c909c2e91b811a.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1244
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2584
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1596
  • C:\Windows\system32\fxssvc.exe
    C:\Windows\system32\fxssvc.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:380
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:4748
  • C:\Windows\System32\SensorDataService.exe
    C:\Windows\System32\SensorDataService.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    PID:4320
  • C:\Windows\system32\spectrum.exe
    C:\Windows\system32\spectrum.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    PID:3552
  • C:\Windows\System32\OpenSSH\ssh-agent.exe
    C:\Windows\System32\OpenSSH\ssh-agent.exe
    1⤵
    • Executes dropped EXE
    PID:5052
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
    1⤵
      PID:404
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        PID:5560
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
        2⤵
        • Modifies data under HKEY_USERS
        PID:5600
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
      • Executes dropped EXE
      PID:3764
    • C:\Windows\system32\wbengine.exe
      "C:\Windows\system32\wbengine.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3220
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3804
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Executes dropped EXE
      PID:4432
    • C:\Windows\system32\AgentService.exe
      C:\Windows\system32\AgentService.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4472
    • C:\Windows\system32\TieringEngineService.exe
      C:\Windows\system32\TieringEngineService.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:3364
    • C:\Windows\System32\snmptrap.exe
      C:\Windows\System32\snmptrap.exe
      1⤵
      • Executes dropped EXE
      PID:864
    • C:\Windows\system32\locator.exe
      C:\Windows\system32\locator.exe
      1⤵
      • Executes dropped EXE
      PID:4868
    • C:\Windows\SysWow64\perfhost.exe
      C:\Windows\SysWow64\perfhost.exe
      1⤵
      • Executes dropped EXE
      PID:4684
    • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      1⤵
      • Executes dropped EXE
      PID:2496
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:2304
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:5016
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      PID:5072
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4528
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
      1⤵
        PID:1776

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

              Filesize

              659KB

              MD5

              f10cd5e223d0b8e1bea745832947788c

              SHA1

              66180f002a8f8369b7f03ff000f48d0128cb58e9

              SHA256

              9bfcf508abb281a38101d571b8281c71fdd1bff320422b1605677a5c7d759aa7

              SHA512

              249b54f28f48d0a35a8af1f05acea8c60dec94892ae89cb73b29ba719c0bd479511d20a6b2b720c366eab09b207f2dc3c1bc640d121656f2998ba136a3446dcc

            • C:\Windows\System32\FXSSVC.exe

              Filesize

              1.2MB

              MD5

              16a8535256229cb1310eccce7b125b12

              SHA1

              ab3b87ca4ce9552e4aaf27c94e440629499624a6

              SHA256

              c65773ddfe082398ab296103891ddf1f6fb6abe00646265fe7271a715db13f6b

              SHA512

              8029bfaca696f92b354defcebaa55716f882ffb32e16b8037207a0b7f67a934b76634a611c1052170097dc3d33f87b690168fb003c870d8eec7471a5469aca12

            • memory/380-105-0x0000000000920000-0x0000000000980000-memory.dmp

              Filesize

              384KB

            • memory/380-104-0x0000000140000000-0x0000000140135000-memory.dmp

              Filesize

              1.2MB

            • memory/380-111-0x0000000000920000-0x0000000000980000-memory.dmp

              Filesize

              384KB

            • memory/380-118-0x0000000140000000-0x0000000140135000-memory.dmp

              Filesize

              1.2MB

            • memory/380-115-0x0000000000920000-0x0000000000980000-memory.dmp

              Filesize

              384KB

            • memory/864-309-0x0000000140000000-0x0000000140096000-memory.dmp

              Filesize

              600KB

            • memory/864-242-0x0000000140000000-0x0000000140096000-memory.dmp

              Filesize

              600KB

            • memory/864-249-0x00000000006F0000-0x0000000000750000-memory.dmp

              Filesize

              384KB

            • memory/1244-6-0x0000000000990000-0x00000000009F7000-memory.dmp

              Filesize

              412KB

            • memory/1244-0-0x0000000000400000-0x00000000005DB000-memory.dmp

              Filesize

              1.9MB

            • memory/1244-650-0x0000000000400000-0x00000000005DB000-memory.dmp

              Filesize

              1.9MB

            • memory/1244-130-0x0000000000400000-0x00000000005DB000-memory.dmp

              Filesize

              1.9MB

            • memory/1244-1-0x0000000000990000-0x00000000009F7000-memory.dmp

              Filesize

              412KB

            • memory/1596-100-0x00000000006C0000-0x0000000000720000-memory.dmp

              Filesize

              384KB

            • memory/1596-159-0x0000000140000000-0x00000001400A9000-memory.dmp

              Filesize

              676KB

            • memory/1596-92-0x0000000140000000-0x00000001400A9000-memory.dmp

              Filesize

              676KB

            • memory/1596-93-0x00000000006C0000-0x0000000000720000-memory.dmp

              Filesize

              384KB

            • memory/2304-240-0x0000000140000000-0x00000001400CF000-memory.dmp

              Filesize

              828KB

            • memory/2304-185-0x00000000004F0000-0x0000000000550000-memory.dmp

              Filesize

              384KB

            • memory/2304-173-0x0000000140000000-0x00000001400CF000-memory.dmp

              Filesize

              828KB

            • memory/2496-198-0x0000000000BD0000-0x0000000000C30000-memory.dmp

              Filesize

              384KB

            • memory/2496-189-0x0000000140000000-0x00000001400AB000-memory.dmp

              Filesize

              684KB

            • memory/2496-252-0x0000000140000000-0x00000001400AB000-memory.dmp

              Filesize

              684KB

            • memory/2584-142-0x0000000140000000-0x00000001400AA000-memory.dmp

              Filesize

              680KB

            • memory/2584-12-0x0000000140000000-0x00000001400AA000-memory.dmp

              Filesize

              680KB

            • memory/2584-11-0x0000000000770000-0x00000000007D0000-memory.dmp

              Filesize

              384KB

            • memory/2584-78-0x0000000000770000-0x00000000007D0000-memory.dmp

              Filesize

              384KB

            • memory/3220-345-0x0000000000BE0000-0x0000000000C40000-memory.dmp

              Filesize

              384KB

            • memory/3220-337-0x0000000140000000-0x0000000140216000-memory.dmp

              Filesize

              2.1MB

            • memory/3364-289-0x0000000000500000-0x0000000000560000-memory.dmp

              Filesize

              384KB

            • memory/3364-281-0x0000000140000000-0x00000001400E2000-memory.dmp

              Filesize

              904KB

            • memory/3364-348-0x0000000140000000-0x00000001400E2000-memory.dmp

              Filesize

              904KB

            • memory/3552-255-0x0000000140000000-0x0000000140169000-memory.dmp

              Filesize

              1.4MB

            • memory/3552-262-0x0000000000790000-0x00000000007F0000-memory.dmp

              Filesize

              384KB

            • memory/3552-322-0x0000000140000000-0x0000000140169000-memory.dmp

              Filesize

              1.4MB

            • memory/3764-358-0x0000000000710000-0x0000000000770000-memory.dmp

              Filesize

              384KB

            • memory/3764-349-0x0000000140000000-0x00000001400C6000-memory.dmp

              Filesize

              792KB

            • memory/3804-323-0x0000000140000000-0x00000001401FC000-memory.dmp

              Filesize

              2.0MB

            • memory/3804-332-0x00000000007F0000-0x0000000000850000-memory.dmp

              Filesize

              384KB

            • memory/4320-227-0x0000000140000000-0x00000001401D7000-memory.dmp

              Filesize

              1.8MB

            • memory/4320-236-0x0000000000660000-0x00000000006C0000-memory.dmp

              Filesize

              384KB

            • memory/4320-293-0x0000000140000000-0x00000001401D7000-memory.dmp

              Filesize

              1.8MB

            • memory/4432-551-0x0000000140000000-0x0000000140147000-memory.dmp

              Filesize

              1.3MB

            • memory/4432-311-0x0000000140000000-0x0000000140147000-memory.dmp

              Filesize

              1.3MB

            • memory/4432-319-0x0000000000BB0000-0x0000000000C10000-memory.dmp

              Filesize

              384KB

            • memory/4472-295-0x0000000140000000-0x00000001401C0000-memory.dmp

              Filesize

              1.8MB

            • memory/4472-307-0x0000000000580000-0x00000000005E0000-memory.dmp

              Filesize

              384KB

            • memory/4472-306-0x0000000140000000-0x00000001401C0000-memory.dmp

              Filesize

              1.8MB

            • memory/4472-302-0x0000000000580000-0x00000000005E0000-memory.dmp

              Filesize

              384KB

            • memory/4528-132-0x0000000140000000-0x000000014022B000-memory.dmp

              Filesize

              2.2MB

            • memory/4528-138-0x00000000001A0000-0x0000000000200000-memory.dmp

              Filesize

              384KB

            • memory/4528-202-0x0000000140000000-0x000000014022B000-memory.dmp

              Filesize

              2.2MB

            • memory/4528-129-0x00000000001A0000-0x0000000000200000-memory.dmp

              Filesize

              384KB

            • memory/4608-371-0x0000000000730000-0x0000000000790000-memory.dmp

              Filesize

              384KB

            • memory/4608-363-0x0000000140000000-0x0000000140179000-memory.dmp

              Filesize

              1.5MB

            • memory/4684-266-0x0000000000400000-0x0000000000497000-memory.dmp

              Filesize

              604KB

            • memory/4684-204-0x0000000000400000-0x0000000000497000-memory.dmp

              Filesize

              604KB

            • memory/4684-209-0x0000000000830000-0x0000000000897000-memory.dmp

              Filesize

              412KB

            • memory/4748-117-0x0000000000530000-0x0000000000590000-memory.dmp

              Filesize

              384KB

            • memory/4748-119-0x0000000140000000-0x0000000140237000-memory.dmp

              Filesize

              2.2MB

            • memory/4748-188-0x0000000140000000-0x0000000140237000-memory.dmp

              Filesize

              2.2MB

            • memory/4748-125-0x0000000000530000-0x0000000000590000-memory.dmp

              Filesize

              384KB

            • memory/4868-280-0x0000000140000000-0x0000000140095000-memory.dmp

              Filesize

              596KB

            • memory/4868-214-0x0000000140000000-0x0000000140095000-memory.dmp

              Filesize

              596KB

            • memory/4868-222-0x00000000006A0000-0x0000000000700000-memory.dmp

              Filesize

              384KB

            • memory/5016-161-0x0000000000D20000-0x0000000000D80000-memory.dmp

              Filesize

              384KB

            • memory/5016-169-0x0000000000D20000-0x0000000000D80000-memory.dmp

              Filesize

              384KB

            • memory/5016-225-0x0000000140000000-0x00000001400B9000-memory.dmp

              Filesize

              740KB

            • memory/5016-160-0x0000000140000000-0x00000001400B9000-memory.dmp

              Filesize

              740KB

            • memory/5052-335-0x0000000140000000-0x0000000140102000-memory.dmp

              Filesize

              1.0MB

            • memory/5052-269-0x0000000140000000-0x0000000140102000-memory.dmp

              Filesize

              1.0MB

            • memory/5052-275-0x0000000000840000-0x00000000008A0000-memory.dmp

              Filesize

              384KB

            • memory/5072-151-0x0000000002280000-0x00000000022E0000-memory.dmp

              Filesize

              384KB

            • memory/5072-144-0x0000000140000000-0x00000001400CA000-memory.dmp

              Filesize

              808KB

            • memory/5072-143-0x0000000002280000-0x00000000022E0000-memory.dmp

              Filesize

              384KB

            • memory/5072-155-0x0000000002280000-0x00000000022E0000-memory.dmp

              Filesize

              384KB

            • memory/5072-157-0x0000000140000000-0x00000001400CA000-memory.dmp

              Filesize

              808KB

            • memory/5600-689-0x0000027AF6270000-0x0000027AF6280000-memory.dmp

              Filesize

              64KB