Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 04:13

General

  • Target

    58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1.exe

  • Size

    4.8MB

  • MD5

    3cac4651ce934a43d65392a7e829a7fd

  • SHA1

    b4c714c4706e707ffa1169f1f2b3544a609aa81c

  • SHA256

    58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1

  • SHA512

    9af0c99801ad057d23ae93daf2fa791b1458c64fff9500949ac6d61ee7cd40c6a20c2cf9cd6fd9c65f40e92e673e68717d448bc61512532f8313dbaccaff9cca

  • SSDEEP

    49152:bf9ADg4ioiWuWekjXIKC38hje8XhDA4FYb+Ecv/6:yi3WulBKg

Score
9/10

Malware Config

Signatures

  • Detects executables containing bas64 encoded gzip files 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1.exe
    "C:\Users\Admin\AppData\Local\Temp\58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tWWP4ueKpS.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1336
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:3608
        • C:\Program Files (x86)\MSBuild\Microsoft\upfc.exe
          "C:\Program Files (x86)\MSBuild\Microsoft\upfc.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tWWP4ueKpS.bat

      Filesize

      177B

      MD5

      e178cb7df041c5b193cc764803b3534b

      SHA1

      1174773dcda8014b57629ef9d75c0d74b1e1f1c8

      SHA256

      5a4ea67fc1746c6a315ac0756147b703e1122e419f625866dd0d41cfe52390a4

      SHA512

      66e17473b11019033f55dc297350da8c27bd41171983f9959e6ddb1cb65d5d78669af088ec82723e78a5cfd550aa8ad4a20e424baf5bdb85a5ce358c420165a7

    • C:\Windows\Downloaded Program Files\upfc.exe

      Filesize

      4.8MB

      MD5

      3cac4651ce934a43d65392a7e829a7fd

      SHA1

      b4c714c4706e707ffa1169f1f2b3544a609aa81c

      SHA256

      58f720c7664a0eea1e99b9293dffba1d45930a1ace26ba296ae81f461d5953d1

      SHA512

      9af0c99801ad057d23ae93daf2fa791b1458c64fff9500949ac6d61ee7cd40c6a20c2cf9cd6fd9c65f40e92e673e68717d448bc61512532f8313dbaccaff9cca

    • memory/2296-46-0x00007FFD669E0000-0x00007FFD669E1000-memory.dmp

      Filesize

      4KB

    • memory/2296-20-0x000000001C270000-0x000000001C288000-memory.dmp

      Filesize

      96KB

    • memory/2296-5-0x000000001B8A0000-0x000000001B8C6000-memory.dmp

      Filesize

      152KB

    • memory/2296-6-0x00007FFD67090000-0x00007FFD6714E000-memory.dmp

      Filesize

      760KB

    • memory/2296-7-0x00007FFD67080000-0x00007FFD67081000-memory.dmp

      Filesize

      4KB

    • memory/2296-8-0x00007FFD67070000-0x00007FFD67071000-memory.dmp

      Filesize

      4KB

    • memory/2296-10-0x0000000002C40000-0x0000000002C4E000-memory.dmp

      Filesize

      56KB

    • memory/2296-11-0x00007FFD67060000-0x00007FFD67061000-memory.dmp

      Filesize

      4KB

    • memory/2296-13-0x000000001B8F0000-0x000000001B90C000-memory.dmp

      Filesize

      112KB

    • memory/2296-14-0x000000001C220000-0x000000001C270000-memory.dmp

      Filesize

      320KB

    • memory/2296-15-0x00007FFD67050000-0x00007FFD67051000-memory.dmp

      Filesize

      4KB

    • memory/2296-17-0x0000000002C50000-0x0000000002C60000-memory.dmp

      Filesize

      64KB

    • memory/2296-18-0x00007FFD67040000-0x00007FFD67041000-memory.dmp

      Filesize

      4KB

    • memory/2296-48-0x000000001C2A0000-0x000000001C2AE000-memory.dmp

      Filesize

      56KB

    • memory/2296-22-0x000000001B8D0000-0x000000001B8E0000-memory.dmp

      Filesize

      64KB

    • memory/2296-23-0x00007FFD67030000-0x00007FFD67031000-memory.dmp

      Filesize

      4KB

    • memory/2296-25-0x000000001B8E0000-0x000000001B8F0000-memory.dmp

      Filesize

      64KB

    • memory/2296-26-0x00007FFD67020000-0x00007FFD67021000-memory.dmp

      Filesize

      4KB

    • memory/2296-28-0x000000001C210000-0x000000001C21E000-memory.dmp

      Filesize

      56KB

    • memory/2296-29-0x00007FFD67010000-0x00007FFD67011000-memory.dmp

      Filesize

      4KB

    • memory/2296-31-0x000000001C2B0000-0x000000001C2C2000-memory.dmp

      Filesize

      72KB

    • memory/2296-32-0x00007FFD48E80000-0x00007FFD49941000-memory.dmp

      Filesize

      10.8MB

    • memory/2296-33-0x00007FFD67000000-0x00007FFD67001000-memory.dmp

      Filesize

      4KB

    • memory/2296-34-0x000000001B910000-0x000000001B920000-memory.dmp

      Filesize

      64KB

    • memory/2296-35-0x00007FFD66E20000-0x00007FFD66E21000-memory.dmp

      Filesize

      4KB

    • memory/2296-37-0x000000001C290000-0x000000001C2A0000-memory.dmp

      Filesize

      64KB

    • memory/2296-39-0x000000001C2F0000-0x000000001C306000-memory.dmp

      Filesize

      88KB

    • memory/2296-40-0x00007FFD67090000-0x00007FFD6714E000-memory.dmp

      Filesize

      760KB

    • memory/2296-41-0x00007FFD66A00000-0x00007FFD66A01000-memory.dmp

      Filesize

      4KB

    • memory/2296-42-0x00007FFD669F0000-0x00007FFD669F1000-memory.dmp

      Filesize

      4KB

    • memory/2296-49-0x00007FFD669D0000-0x00007FFD669D1000-memory.dmp

      Filesize

      4KB

    • memory/2296-45-0x000000001C860000-0x000000001CD88000-memory.dmp

      Filesize

      5.2MB

    • memory/2296-54-0x000000001C2E0000-0x000000001C2F0000-memory.dmp

      Filesize

      64KB

    • memory/2296-3-0x000000001B910000-0x000000001B920000-memory.dmp

      Filesize

      64KB

    • memory/2296-44-0x000000001C310000-0x000000001C322000-memory.dmp

      Filesize

      72KB

    • memory/2296-51-0x000000001C2D0000-0x000000001C2E0000-memory.dmp

      Filesize

      64KB

    • memory/2296-52-0x00007FFD669C0000-0x00007FFD669C1000-memory.dmp

      Filesize

      4KB

    • memory/2296-0-0x00000000004E0000-0x00000000009AE000-memory.dmp

      Filesize

      4.8MB

    • memory/2296-56-0x000000001C390000-0x000000001C3EA000-memory.dmp

      Filesize

      360KB

    • memory/2296-57-0x00007FFD669B0000-0x00007FFD669B1000-memory.dmp

      Filesize

      4KB

    • memory/2296-58-0x00007FFD669A0000-0x00007FFD669A1000-memory.dmp

      Filesize

      4KB

    • memory/2296-60-0x000000001C330000-0x000000001C33E000-memory.dmp

      Filesize

      56KB

    • memory/2296-62-0x000000001C340000-0x000000001C350000-memory.dmp

      Filesize

      64KB

    • memory/2296-63-0x00007FFD66990000-0x00007FFD66991000-memory.dmp

      Filesize

      4KB

    • memory/2296-65-0x000000001C350000-0x000000001C35E000-memory.dmp

      Filesize

      56KB

    • memory/2296-66-0x00007FFD66980000-0x00007FFD66981000-memory.dmp

      Filesize

      4KB

    • memory/2296-69-0x000000001C3F0000-0x000000001C408000-memory.dmp

      Filesize

      96KB

    • memory/2296-68-0x00007FFD66970000-0x00007FFD66971000-memory.dmp

      Filesize

      4KB

    • memory/2296-70-0x00007FFD66960000-0x00007FFD66961000-memory.dmp

      Filesize

      4KB

    • memory/2296-72-0x000000001C460000-0x000000001C4AE000-memory.dmp

      Filesize

      312KB

    • memory/2296-2-0x000000001B530000-0x000000001B79E000-memory.dmp

      Filesize

      2.4MB

    • memory/2296-1-0x00007FFD48E80000-0x00007FFD49941000-memory.dmp

      Filesize

      10.8MB

    • memory/2296-89-0x00007FFD48E80000-0x00007FFD49941000-memory.dmp

      Filesize

      10.8MB

    • memory/2296-90-0x00007FFD67090000-0x00007FFD6714E000-memory.dmp

      Filesize

      760KB

    • memory/3200-94-0x00007FFD48C80000-0x00007FFD49741000-memory.dmp

      Filesize

      10.8MB

    • memory/3200-95-0x000000001B9B0000-0x000000001B9C0000-memory.dmp

      Filesize

      64KB

    • memory/3200-97-0x00007FFD67090000-0x00007FFD6714E000-memory.dmp

      Filesize

      760KB

    • memory/3200-98-0x00007FFD67080000-0x00007FFD67081000-memory.dmp

      Filesize

      4KB

    • memory/3200-100-0x00007FFD67070000-0x00007FFD67071000-memory.dmp

      Filesize

      4KB

    • memory/3200-101-0x00007FFD67060000-0x00007FFD67061000-memory.dmp

      Filesize

      4KB

    • memory/3200-104-0x00007FFD67050000-0x00007FFD67051000-memory.dmp

      Filesize

      4KB

    • memory/3200-107-0x000000001B9B0000-0x000000001B9C0000-memory.dmp

      Filesize

      64KB

    • memory/3200-106-0x00007FFD67040000-0x00007FFD67041000-memory.dmp

      Filesize

      4KB

    • memory/3200-109-0x00007FFD67030000-0x00007FFD67031000-memory.dmp

      Filesize

      4KB

    • memory/3200-144-0x000000001BAE0000-0x000000001BAE8000-memory.dmp

      Filesize

      32KB

    • memory/3200-145-0x000000001C6E0000-0x000000001C7E2000-memory.dmp

      Filesize

      1.0MB