Resubmissions

13/01/2024, 07:04

240113-hwc73aefh4 7

Analysis

  • max time kernel
    305s
  • max time network
    313s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/01/2024, 07:04

General

  • Target

    CsgoRebornV2.exe

  • Size

    140.1MB

  • MD5

    49a6cf6e78904edfd5f4581d9e2ff639

  • SHA1

    2867f97eda06dc1c167f5ed4ccbdfeab71fde26a

  • SHA256

    e7b5473ea212ab81c1c49250ce6ba12c76185cb04f64cdc541ed7d4e86f0156d

  • SHA512

    fb1e6299673823b194339c298ae3943a53409f7596db836319325fd679cdf3e49b8da8a5bebbc8d84b5209b36bc5991c9c3a21e000e2e7ca5cc2f005d4a6a0fb

  • SSDEEP

    1572864:A2Cm7gJKfVjsPawuFHNwczWTeMkF7ZEk8bCkKbj:XaodJFek8+k

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe
    "C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe
      "C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\CsgoRebornV2" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1776,i,1920992902480017486,10884961883113455866,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:5192
      • C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe
        "C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\CsgoRebornV2" --mojo-platform-channel-handle=2076 --field-trial-handle=1776,i,1920992902480017486,10884961883113455866,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:2816
        • C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe
          "C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\CsgoRebornV2" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2392 --field-trial-handle=1776,i,1920992902480017486,10884961883113455866,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
            PID:3552
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
            2⤵
              PID:2840
              • C:\Windows\system32\tasklist.exe
                tasklist
                3⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:3248
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"
              2⤵
                PID:5036
                • C:\Windows\system32\reg.exe
                  C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath
                  3⤵
                    PID:2056
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""
                  2⤵
                    PID:2772
                    • C:\Windows\system32\reg.exe
                      C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"
                      3⤵
                        PID:2744
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"
                      2⤵
                        PID:1788
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3008
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                        2⤵
                          PID:5856
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic path win32_VideoController get name
                            3⤵
                            • Detects videocard installed
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4324
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"
                          2⤵
                            PID:5572
                            • C:\Windows\system32\cmd.exe
                              cmd /c chcp 65001
                              3⤵
                                PID:1700
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  4⤵
                                    PID:5904
                                • C:\Windows\system32\netsh.exe
                                  netsh wlan show profiles
                                  3⤵
                                    PID:3620
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f"
                                  2⤵
                                    PID:6084
                                    • C:\Windows\system32\reg.exe
                                      C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f
                                      3⤵
                                      • Adds Run key to start application
                                      PID:2300
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                    2⤵
                                      PID:6060
                                      • C:\Windows\system32\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        PID:5608
                                    • C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe
                                      "C:\Users\Admin\AppData\Local\Temp\CsgoRebornV2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\CsgoRebornV2" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1460 --field-trial-handle=1776,i,1920992902480017486,10884961883113455866,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4172

                                  Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\127e6675-92c9-40a4-a060-23878d3a614f.tmp.node

                                          Filesize

                                          2.6MB

                                          MD5

                                          083fd9f2e3e93e1f2c599a2b609c9e5e

                                          SHA1

                                          6db2b6ce3e60d828ca32a6000c270c09224f3139

                                          SHA256

                                          5800c926c34c7ef38a45840c30e8855c1b3a6ec1ec8f37ffc6ce2d402728eabd

                                          SHA512

                                          08206b13d7e91f36d65de545b483d5fa446c2a1d8baab4c2fb19aa711af10cbfd98da3811d34a16033b5c09eb297fdcfaf09a186b4dcf69e84bb4dfcc11d96b2

                                        • C:\Users\Admin\AppData\Local\Temp\c978aae1-44ee-4a19-96b1-e565b19e8e37.tmp.node

                                          Filesize

                                          642KB

                                          MD5

                                          fd553df16c01118f3181f50d4cee2536

                                          SHA1

                                          b8f7fa1e64ff22c98ba3e9293cb273377d57efb4

                                          SHA256

                                          57e6d15f5fd6ece298fd2526b57c634bb2796ff5f3bcc6e64fbdb40d842a2c77

                                          SHA512

                                          4b0677769dfc09716d98ec76c95db980520db8b3b29ed45dddbee1c535441913d70c01d4459b1f144e5e6f80310e51503d7296183b481441e2603594ab9c4642

                                        • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Antivirus.txt

                                          Filesize

                                          231B

                                          MD5

                                          dec2be4f1ec3592cea668aa279e7cc9b

                                          SHA1

                                          327cf8ab0c895e10674e00ea7f437784bb11d718

                                          SHA256

                                          753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc

                                          SHA512

                                          81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

                                        • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\AutoFill Data\All Autofill Data.txt

                                          Filesize

                                          249B

                                          MD5

                                          cf7e4a12f932a3fddddacc8b10e1f1b0

                                          SHA1

                                          db6f9bc2be5e0905086b7b7b07109ef8d67b24ee

                                          SHA256

                                          1b6d3f6ad849e115bf20175985bed9bcfc6ec206e288b97ac14c3a23b5d28a4b

                                          SHA512

                                          fab79f26c1841310cc61e2f8336ca05281a9252a34a3c240e500c8775840374edb0a42094c64aa38a29ca79e1cafa114d6f1bbe3009060d32f8c1df9f088c12c

                                        • C:\Users\Admin\AppData\Roaming\CsgoRebornV2\Network\Network Persistent State

                                          Filesize

                                          296B

                                          MD5

                                          8fa74e7c931a5c60fd6fb7fde3b21043

                                          SHA1

                                          cb62f8a39f0fc6d5ce16e73316abfad251b3f7e3

                                          SHA256

                                          3136fe165776fd237c01096b6d29d5b45e7871a2cd03582eaa5370d6d509d5ce

                                          SHA512

                                          589f60f9973f1510e70ebd788d041b2afd54f6799f927933e9d2d3325f3286664939c9b946437c619f07416b21a144cb61986bdc97154d081b1fa3739521870f

                                        • C:\Users\Admin\AppData\Roaming\CsgoRebornV2\Network\Network Persistent State~RFe58ddf7.TMP

                                          Filesize

                                          59B

                                          MD5

                                          2800881c775077e1c4b6e06bf4676de4

                                          SHA1

                                          2873631068c8b3b9495638c865915be822442c8b

                                          SHA256

                                          226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                          SHA512

                                          e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                          Filesize

                                          2B

                                          MD5

                                          f3b25701fe362ec84616a93a45ce9998

                                          SHA1

                                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                          SHA256

                                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                          SHA512

                                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                        • memory/3552-25-0x00007FF939570000-0x00007FF939571000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3552-26-0x0000014028140000-0x0000014028141000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3552-133-0x0000014027F90000-0x000001402813C000-memory.dmp

                                          Filesize

                                          1.7MB

                                        • memory/4172-168-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-167-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-166-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-173-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-172-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-175-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-174-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-177-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-176-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4172-178-0x000001A598450000-0x000001A598451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5192-7-0x00007FF938AE0000-0x00007FF938AE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5192-132-0x0000018B4B660000-0x0000018B4B80C000-memory.dmp

                                          Filesize

                                          1.7MB