Resubmissions

29-12-2023 16:54

231229-venzfsecfm 7

Analysis

  • max time kernel
    5s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 16:54

General

  • Target

    updater.exe

  • Size

    62.3MB

  • MD5

    91ea9c72059f52e9e0769fff4d76ca5d

  • SHA1

    3ce72eefb89093b32dce452d03b46a713c894cf7

  • SHA256

    e811567264dd128af6efa83239cf708c19e2b2448f10ecff11273494636f9ded

  • SHA512

    fbf8d4669e15c782b83aff1cdca6f02d6166641a3fe3ada94e23b5123f36f082670b6aaad83f34c0259aef4dbbc2ef2501732e8d78c3548659259c70edf71d7d

  • SSDEEP

    1572864:hm6aqeAMcLGXdHPMNMLpZyIdiBcQ60E8z:86aZAuNHPfLDjih60E8z

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\updater.exe
    "C:\Users\Admin\AppData\Local\Temp\updater.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe
      C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe
      2⤵
        PID:4612
        • C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe
          "C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --mojo-platform-channel-handle=1996 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          3⤵
            PID:1508
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"
            3⤵
              PID:5348
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
              3⤵
                PID:5252
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"
                3⤵
                  PID:1364
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"
                  3⤵
                    PID:1768
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""
                    3⤵
                      PID:4196
                    • C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe
                      "C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --app-path="C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2412 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                      3⤵
                        PID:1460
                      • C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe
                        "C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                        3⤵
                          PID:4772
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                          3⤵
                            PID:5752
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f"
                            3⤵
                              PID:5744
                            • C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe
                              "C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3460 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                              3⤵
                                PID:5992
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic path win32_VideoController get name
                            1⤵
                            • Detects videocard installed
                            PID:5304
                          • C:\Windows\system32\netsh.exe
                            netsh wlan show profiles
                            1⤵
                              PID:5428
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              1⤵
                                PID:5412
                              • C:\Windows\system32\cmd.exe
                                cmd /c chcp 65001
                                1⤵
                                  PID:5396
                                • C:\Windows\system32\reg.exe
                                  C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath
                                  1⤵
                                    PID:5204
                                  • C:\Windows\system32\reg.exe
                                    C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"
                                    1⤵
                                      PID:5184
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                                      1⤵
                                        PID:5156
                                      • C:\Windows\system32\reg.exe
                                        C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f
                                        1⤵
                                          PID:5836
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist
                                          1⤵
                                          • Enumerates processes with tasklist
                                          PID:5828
                                        • C:\Windows\system32\taskmgr.exe
                                          "C:\Windows\system32\taskmgr.exe" /4
                                          1⤵
                                            PID:5784
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:2296

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\chrome_100_percent.pak

                                              Filesize

                                              145KB

                                              MD5

                                              237ca1be894f5e09fd1ccb934229c33b

                                              SHA1

                                              f0dfcf6db1481315054efb690df282ffe53e9fa1

                                              SHA256

                                              f14362449e2a7c940c095eda9c41aad5f1e0b1a1b21d1dc911558291c0c36dd2

                                              SHA512

                                              1e52782db4a397e27ce92412192e4de6d7398effaf8c7acabc9c06a317c2f69ee5c35da1070eb94020ed89779344b957edb6b40f871b8a15f969ef787fbb2bca

                                            • C:\Users\Admin\AppData\Local\Temp\nsy5C1B.tmp\System.dll

                                              Filesize

                                              12KB

                                              MD5

                                              0d7ad4f45dc6f5aa87f606d0331c6901

                                              SHA1

                                              48df0911f0484cbe2a8cdd5362140b63c41ee457

                                              SHA256

                                              3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

                                              SHA512

                                              c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

                                            • C:\Users\Admin\AppData\Local\Temp\nsy5C1B.tmp\nsis7z.dll

                                              Filesize

                                              92KB

                                              MD5

                                              11ffa351bf57696667a924b68767c91a

                                              SHA1

                                              eec350303643a40688a5d5d814a2eb49c994cc7d

                                              SHA256

                                              df82d03dee4b432246a4ee7f5958100dfdf01c0410f961f315d6e522bac058af

                                              SHA512

                                              655506b98c6f9efa2022edbb908c51a26a6c141af6e7ecca783fc8f70297d0ec86c1778c6055da5af7680378eaca8fa6b9ec84efaf0505986927b0f87544873c

                                            • memory/1460-688-0x000001E0A77B0000-0x000001E0A77E0000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/1460-582-0x00007FFBE2090000-0x00007FFBE2091000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1460-581-0x00007FFBE2080000-0x00007FFBE2081000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4772-687-0x000001CE50CC0000-0x000001CE50CF0000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/4772-557-0x00007FFBE27F0000-0x00007FFBE27F1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-715-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-725-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-724-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-723-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-722-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-721-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-720-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-719-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-714-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5784-713-0x0000022AE84D0000-0x0000022AE84D1000-memory.dmp

                                              Filesize

                                              4KB