Resubmissions
29-12-2023 16:54
231229-venzfsecfm 7Analysis
-
max time kernel
5s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 16:54
Static task
static1
Behavioral task
behavioral1
Sample
updater.exe
Resource
win10v2004-20231215-en
General
-
Target
updater.exe
-
Size
62.3MB
-
MD5
91ea9c72059f52e9e0769fff4d76ca5d
-
SHA1
3ce72eefb89093b32dce452d03b46a713c894cf7
-
SHA256
e811567264dd128af6efa83239cf708c19e2b2448f10ecff11273494636f9ded
-
SHA512
fbf8d4669e15c782b83aff1cdca6f02d6166641a3fe3ada94e23b5123f36f082670b6aaad83f34c0259aef4dbbc2ef2501732e8d78c3548659259c70edf71d7d
-
SSDEEP
1572864:hm6aqeAMcLGXdHPMNMLpZyIdiBcQ60E8z:86aZAuNHPfLDjih60E8z
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2136 updater.exe 2136 updater.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ipinfo.io 31 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5304 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5828 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2136 updater.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exeC:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe2⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe"C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --mojo-platform-channel-handle=1996 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:83⤵PID:1508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"3⤵PID:5348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"3⤵PID:5252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"3⤵PID:1364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"3⤵PID:1768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""3⤵PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe"C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --app-path="C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2412 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe"C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵PID:4772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"3⤵PID:5752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f"3⤵PID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe"C:\Users\Admin\AppData\Local\Temp\2ZidQNSw2b3DkU3fP0oLZ5qf3od\updater.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\updater" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3460 --field-trial-handle=1844,i,2298216046048572546,1942479366722123673,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵PID:5992
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name1⤵
- Detects videocard installed
PID:5304
-
C:\Windows\system32\netsh.exenetsh wlan show profiles1⤵PID:5428
-
C:\Windows\system32\chcp.comchcp 650011⤵PID:5412
-
C:\Windows\system32\cmd.execmd /c chcp 650011⤵PID:5396
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath1⤵PID:5204
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"1⤵PID:5184
-
C:\Windows\System32\Wbem\WMIC.exewmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List1⤵PID:5156
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f1⤵PID:5836
-
C:\Windows\system32\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:5828
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:5784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5237ca1be894f5e09fd1ccb934229c33b
SHA1f0dfcf6db1481315054efb690df282ffe53e9fa1
SHA256f14362449e2a7c940c095eda9c41aad5f1e0b1a1b21d1dc911558291c0c36dd2
SHA5121e52782db4a397e27ce92412192e4de6d7398effaf8c7acabc9c06a317c2f69ee5c35da1070eb94020ed89779344b957edb6b40f871b8a15f969ef787fbb2bca
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
92KB
MD511ffa351bf57696667a924b68767c91a
SHA1eec350303643a40688a5d5d814a2eb49c994cc7d
SHA256df82d03dee4b432246a4ee7f5958100dfdf01c0410f961f315d6e522bac058af
SHA512655506b98c6f9efa2022edbb908c51a26a6c141af6e7ecca783fc8f70297d0ec86c1778c6055da5af7680378eaca8fa6b9ec84efaf0505986927b0f87544873c