Analysis

  • max time kernel
    128s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 03:53

General

  • Target

    58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1.exe

  • Size

    4.8MB

  • MD5

    3cac4651ce934a43d65392a7e829a7fd

  • SHA1

    b4c714c4706e707ffa1169f1f2b3544a609aa81c

  • SHA256

    58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1

  • SHA512

    9af0c99801ad057d23ae93daf2fa791b1458c64fff9500949ac6d61ee7cd40c6a20c2cf9cd6fd9c65f40e92e673e68717d448bc61512532f8313dbaccaff9cca

  • SSDEEP

    49152:bf9ADg4ioiWuWekjXIKC38hje8XhDA4FYb+Ecv/6:yi3WulBKg

Score
9/10

Malware Config

Signatures

  • Detects executables containing bas64 encoded gzip files 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1.exe
    "C:\Users\Admin\AppData\Local\Temp\58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\txRVepiSYZ.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\odt\RuntimeBroker.exe
        "C:\odt\RuntimeBroker.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3368
  • C:\Windows\system32\PING.EXE
    ping -n 10 localhost
    1⤵
    • Runs ping.exe
    PID:2348
  • C:\Windows\system32\chcp.com
    chcp 65001
    1⤵
      PID:3948

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Reference Assemblies\Microsoft\Framework\SppExtComObj.exe

      Filesize

      577KB

      MD5

      ad8c44bf639d3aa67fa9f53c7b9a7cf1

      SHA1

      3b8c22c4491622e16185bd89423cae1d9999efbe

      SHA256

      7e2200e420e2d1188c1efc09ac7d08ebcc274acbee8d6fb9b7afb54b5df93912

      SHA512

      b140f44fb75ef25a9a815dcc06666884176887a26a615e760a2fb707bf1faba9df10ab96b19ab7d66d1b170f83b8e636499097ecb0b192a6f06e47d3dac28722

    • C:\Users\Admin\AppData\Local\Temp\txRVepiSYZ.bat

      Filesize

      152B

      MD5

      9b8f36ecce0f2fbafc9436c1fb795916

      SHA1

      22927917fa9c6bf257ad0c920a42d60d334c29aa

      SHA256

      27b38b25a9add533ffefbf71012275ec472a16b88cc78f96d814f651dfbe1349

      SHA512

      bce29a9b96ee7d2a9a9e050290b39b48c3ae1c1d745458f565deba3cda45abb57e6b2a925ec882cce15a8217aa6600b8ce63a8763745994b0b2c78b7475afa9d

    • C:\odt\RuntimeBroker.exe

      Filesize

      4.8MB

      MD5

      3cac4651ce934a43d65392a7e829a7fd

      SHA1

      b4c714c4706e707ffa1169f1f2b3544a609aa81c

      SHA256

      58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1

      SHA512

      9af0c99801ad057d23ae93daf2fa791b1458c64fff9500949ac6d61ee7cd40c6a20c2cf9cd6fd9c65f40e92e673e68717d448bc61512532f8313dbaccaff9cca

    • memory/3368-95-0x00007FF9DA810000-0x00007FF9DB2D1000-memory.dmp

      Filesize

      10.8MB

    • memory/3368-97-0x00007FF9F8230000-0x00007FF9F82EE000-memory.dmp

      Filesize

      760KB

    • memory/3368-110-0x00007FF9F81C0000-0x00007FF9F81C1000-memory.dmp

      Filesize

      4KB

    • memory/3368-108-0x00007FF9F81D0000-0x00007FF9F81D1000-memory.dmp

      Filesize

      4KB

    • memory/3368-106-0x00007FF9F81E0000-0x00007FF9F81E1000-memory.dmp

      Filesize

      4KB

    • memory/3368-103-0x00007FF9F81F0000-0x00007FF9F81F1000-memory.dmp

      Filesize

      4KB

    • memory/3368-102-0x00007FF9F8200000-0x00007FF9F8201000-memory.dmp

      Filesize

      4KB

    • memory/3368-99-0x00007FF9F8210000-0x00007FF9F8211000-memory.dmp

      Filesize

      4KB

    • memory/3368-98-0x00007FF9F8220000-0x00007FF9F8221000-memory.dmp

      Filesize

      4KB

    • memory/4484-35-0x0000000001520000-0x0000000001530000-memory.dmp

      Filesize

      64KB

    • memory/4484-48-0x000000001BD60000-0x000000001BD6E000-memory.dmp

      Filesize

      56KB

    • memory/4484-13-0x0000000002F70000-0x0000000002F8C000-memory.dmp

      Filesize

      112KB

    • memory/4484-11-0x00007FF9F8200000-0x00007FF9F8201000-memory.dmp

      Filesize

      4KB

    • memory/4484-14-0x000000001BD70000-0x000000001BDC0000-memory.dmp

      Filesize

      320KB

    • memory/4484-17-0x0000000002F10000-0x0000000002F20000-memory.dmp

      Filesize

      64KB

    • memory/4484-15-0x00007FF9F81F0000-0x00007FF9F81F1000-memory.dmp

      Filesize

      4KB

    • memory/4484-20-0x0000000002F90000-0x0000000002FA8000-memory.dmp

      Filesize

      96KB

    • memory/4484-23-0x00007FF9F81D0000-0x00007FF9F81D1000-memory.dmp

      Filesize

      4KB

    • memory/4484-22-0x0000000002F50000-0x0000000002F60000-memory.dmp

      Filesize

      64KB

    • memory/4484-18-0x00007FF9F81E0000-0x00007FF9F81E1000-memory.dmp

      Filesize

      4KB

    • memory/4484-26-0x00007FF9F81C0000-0x00007FF9F81C1000-memory.dmp

      Filesize

      4KB

    • memory/4484-25-0x0000000002F60000-0x0000000002F70000-memory.dmp

      Filesize

      64KB

    • memory/4484-27-0x0000000001520000-0x0000000001530000-memory.dmp

      Filesize

      64KB

    • memory/4484-30-0x0000000002FB0000-0x0000000002FBE000-memory.dmp

      Filesize

      56KB

    • memory/4484-28-0x00007FF9F81B0000-0x00007FF9F81B1000-memory.dmp

      Filesize

      4KB

    • memory/4484-32-0x000000001BDE0000-0x000000001BDF2000-memory.dmp

      Filesize

      72KB

    • memory/4484-33-0x00007FF9DAB30000-0x00007FF9DB5F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4484-34-0x00007FF9F81A0000-0x00007FF9F81A1000-memory.dmp

      Filesize

      4KB

    • memory/4484-37-0x0000000002FC0000-0x0000000002FD0000-memory.dmp

      Filesize

      64KB

    • memory/4484-10-0x00007FF9F8210000-0x00007FF9F8211000-memory.dmp

      Filesize

      4KB

    • memory/4484-38-0x00007FF9F8190000-0x00007FF9F8191000-memory.dmp

      Filesize

      4KB

    • memory/4484-41-0x00007FF9F8230000-0x00007FF9F82EE000-memory.dmp

      Filesize

      760KB

    • memory/4484-40-0x000000001BE00000-0x000000001BE16000-memory.dmp

      Filesize

      88KB

    • memory/4484-42-0x00007FF9F8180000-0x00007FF9F8181000-memory.dmp

      Filesize

      4KB

    • memory/4484-44-0x000000001BE20000-0x000000001BE32000-memory.dmp

      Filesize

      72KB

    • memory/4484-45-0x00007FF9F8170000-0x00007FF9F8171000-memory.dmp

      Filesize

      4KB

    • memory/4484-9-0x0000000002F00000-0x0000000002F0E000-memory.dmp

      Filesize

      56KB

    • memory/4484-52-0x00007FF9F8150000-0x00007FF9F8151000-memory.dmp

      Filesize

      4KB

    • memory/4484-51-0x000000001BDC0000-0x000000001BDD0000-memory.dmp

      Filesize

      64KB

    • memory/4484-49-0x00007FF9F8160000-0x00007FF9F8161000-memory.dmp

      Filesize

      4KB

    • memory/4484-46-0x000000001C370000-0x000000001C898000-memory.dmp

      Filesize

      5.2MB

    • memory/4484-55-0x00007FF9F8140000-0x00007FF9F8141000-memory.dmp

      Filesize

      4KB

    • memory/4484-54-0x000000001BDD0000-0x000000001BDE0000-memory.dmp

      Filesize

      64KB

    • memory/4484-56-0x00007FF9F8130000-0x00007FF9F8131000-memory.dmp

      Filesize

      4KB

    • memory/4484-58-0x000000001BEA0000-0x000000001BEFA000-memory.dmp

      Filesize

      360KB

    • memory/4484-62-0x00007FF9F8110000-0x00007FF9F8111000-memory.dmp

      Filesize

      4KB

    • memory/4484-66-0x000000001BE60000-0x000000001BE6E000-memory.dmp

      Filesize

      56KB

    • memory/4484-64-0x000000001BE50000-0x000000001BE60000-memory.dmp

      Filesize

      64KB

    • memory/4484-72-0x000000001BF70000-0x000000001BFBE000-memory.dmp

      Filesize

      312KB

    • memory/4484-70-0x000000001BF00000-0x000000001BF18000-memory.dmp

      Filesize

      96KB

    • memory/4484-73-0x00007FF9F8030000-0x00007FF9F8031000-memory.dmp

      Filesize

      4KB

    • memory/4484-68-0x00007FF9F80F0000-0x00007FF9F80F1000-memory.dmp

      Filesize

      4KB

    • memory/4484-67-0x00007FF9F8100000-0x00007FF9F8101000-memory.dmp

      Filesize

      4KB

    • memory/4484-61-0x00007FF9F8120000-0x00007FF9F8121000-memory.dmp

      Filesize

      4KB

    • memory/4484-7-0x00007FF9F8220000-0x00007FF9F8221000-memory.dmp

      Filesize

      4KB

    • memory/4484-5-0x0000000002F20000-0x0000000002F46000-memory.dmp

      Filesize

      152KB

    • memory/4484-6-0x00007FF9F8230000-0x00007FF9F82EE000-memory.dmp

      Filesize

      760KB

    • memory/4484-3-0x0000000001520000-0x0000000001530000-memory.dmp

      Filesize

      64KB

    • memory/4484-2-0x000000001B9B0000-0x000000001BC1E000-memory.dmp

      Filesize

      2.4MB

    • memory/4484-1-0x00007FF9DAB30000-0x00007FF9DB5F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4484-0-0x00000000008A0000-0x0000000000D6E000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-60-0x000000001BE40000-0x000000001BE4E000-memory.dmp

      Filesize

      56KB

    • memory/4484-91-0x00007FF9F8230000-0x00007FF9F82EE000-memory.dmp

      Filesize

      760KB

    • memory/4484-90-0x00007FF9DAB30000-0x00007FF9DB5F1000-memory.dmp

      Filesize

      10.8MB