Overview
overview
8Static
static
3dependenci...h..bat
windows7-x64
8dependenci...h..bat
windows10-2004-x64
8dependenci...ll.bat
windows7-x64
7dependenci...ll.bat
windows10-2004-x64
7dependenci...64.exe
windows7-x64
7dependenci...64.exe
windows10-2004-x64
7dependenci...86.exe
windows7-x64
7dependenci...86.exe
windows10-2004-x64
7dependenci...64.exe
windows7-x64
7dependenci...64.exe
windows10-2004-x64
7dependenci...86.exe
windows7-x64
7dependenci...86.exe
windows10-2004-x64
7dependenci...64.exe
windows7-x64
7dependenci...64.exe
windows10-2004-x64
7dependenci...86.exe
windows7-x64
7dependenci...86.exe
windows10-2004-x64
7dependenci...64.exe
windows7-x64
7dependenci...64.exe
windows10-2004-x64
7dependenci...86.exe
windows7-x64
7dependenci...86.exe
windows10-2004-x64
7dependenci...64.exe
windows7-x64
7dependenci...64.exe
windows10-2004-x64
7dependenci...86.exe
windows7-x64
7dependenci...86.exe
windows10-2004-x64
7dependenci...64.exe
windows7-x64
7dependenci...64.exe
windows10-2004-x64
7dependenci...86.exe
windows7-x64
7dependenci...86.exe
windows10-2004-x64
7severe.exe
windows7-x64
7severe.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-02-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
dependencies/2024-1-12/auth..bat
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dependencies/2024-1-12/auth..bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
dependencies/install_all.bat
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
dependencies/install_all.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
dependencies/vcredist2005_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
dependencies/vcredist2005_x64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
dependencies/vcredist2005_x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
dependencies/vcredist2005_x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
dependencies/vcredist2008_x64.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
dependencies/vcredist2008_x64.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
dependencies/vcredist2008_x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
dependencies/vcredist2008_x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
dependencies/vcredist2010_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
dependencies/vcredist2010_x64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
dependencies/vcredist2010_x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
dependencies/vcredist2010_x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
dependencies/vcredist2012_x64.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
dependencies/vcredist2012_x64.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
dependencies/vcredist2012_x86.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
dependencies/vcredist2012_x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
dependencies/vcredist2013_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
dependencies/vcredist2013_x64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
dependencies/vcredist2013_x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
dependencies/vcredist2013_x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
dependencies/vcredist2015_2017_2019_2022_x64.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
dependencies/vcredist2015_2017_2019_2022_x64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
dependencies/vcredist2015_2017_2019_2022_x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
dependencies/vcredist2015_2017_2019_2022_x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
severe.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
severe.exe
Resource
win10v2004-20231215-en
General
-
Target
dependencies/2024-1-12/auth..bat
-
Size
6KB
-
MD5
8825cf897e698ebbdb8c707bb39d73ca
-
SHA1
dcece549ce6ed0b24ecc1faf80280c225bdcccae
-
SHA256
b332d0f81de5a8eced6109033f05192e2aa5ca3ed0a523367428813924a9a28d
-
SHA512
e3c63dda17128929108ff5492364b4d2df8126f2a8c17d7384ba9f7b0651aec72c11681dd7196f2eef7d693b9b3165b96fc05c98afc40fab9252ef2c7a26e3f9
-
SSDEEP
192:sYHAivgiRwe5f11ATNLCAtMT7/4+tGs1PP/uQz8tz1hNn:8i4iRwe5f11ATNLCAtMT7/4+tGs1PP/M
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Delays execution with timeout.exe 11 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1664 timeout.exe 2780 timeout.exe 2800 timeout.exe 1112 timeout.exe 2944 timeout.exe 2500 timeout.exe 2836 timeout.exe 2180 timeout.exe 1420 timeout.exe 1076 timeout.exe 1340 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2496 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 2824 powershell.exe 2824 powershell.exe 2824 powershell.exe 2668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exetasklist.exedescription pid process Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 2528 tasklist.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exepowershell.execmd.execmd.execmd.exenet.exedescription pid process target process PID 2376 wrote to memory of 2824 2376 cmd.exe powershell.exe PID 2376 wrote to memory of 2824 2376 cmd.exe powershell.exe PID 2376 wrote to memory of 2824 2376 cmd.exe powershell.exe PID 2824 wrote to memory of 2072 2824 powershell.exe cmd.exe PID 2824 wrote to memory of 2072 2824 powershell.exe cmd.exe PID 2824 wrote to memory of 2072 2824 powershell.exe cmd.exe PID 2072 wrote to memory of 2600 2072 cmd.exe cmd.exe PID 2072 wrote to memory of 2600 2072 cmd.exe cmd.exe PID 2072 wrote to memory of 2600 2072 cmd.exe cmd.exe PID 2600 wrote to memory of 2588 2600 cmd.exe PING.EXE PID 2600 wrote to memory of 2588 2600 cmd.exe PING.EXE PID 2600 wrote to memory of 2588 2600 cmd.exe PING.EXE PID 2600 wrote to memory of 2664 2600 cmd.exe findstr.exe PID 2600 wrote to memory of 2664 2600 cmd.exe findstr.exe PID 2600 wrote to memory of 2664 2600 cmd.exe findstr.exe PID 2072 wrote to memory of 2700 2072 cmd.exe cmd.exe PID 2072 wrote to memory of 2700 2072 cmd.exe cmd.exe PID 2072 wrote to memory of 2700 2072 cmd.exe cmd.exe PID 2700 wrote to memory of 2668 2700 cmd.exe powershell.exe PID 2700 wrote to memory of 2668 2700 cmd.exe powershell.exe PID 2700 wrote to memory of 2668 2700 cmd.exe powershell.exe PID 2072 wrote to memory of 2624 2072 cmd.exe attrib.exe PID 2072 wrote to memory of 2624 2072 cmd.exe attrib.exe PID 2072 wrote to memory of 2624 2072 cmd.exe attrib.exe PID 2072 wrote to memory of 2500 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2500 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2500 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2460 2072 cmd.exe systeminfo.exe PID 2072 wrote to memory of 2460 2072 cmd.exe systeminfo.exe PID 2072 wrote to memory of 2460 2072 cmd.exe systeminfo.exe PID 2072 wrote to memory of 2528 2072 cmd.exe tasklist.exe PID 2072 wrote to memory of 2528 2072 cmd.exe tasklist.exe PID 2072 wrote to memory of 2528 2072 cmd.exe tasklist.exe PID 2072 wrote to memory of 856 2072 cmd.exe net.exe PID 2072 wrote to memory of 856 2072 cmd.exe net.exe PID 2072 wrote to memory of 856 2072 cmd.exe net.exe PID 856 wrote to memory of 1872 856 net.exe net1.exe PID 856 wrote to memory of 1872 856 net.exe net1.exe PID 856 wrote to memory of 1872 856 net.exe net1.exe PID 2072 wrote to memory of 1640 2072 cmd.exe reg.exe PID 2072 wrote to memory of 1640 2072 cmd.exe reg.exe PID 2072 wrote to memory of 1640 2072 cmd.exe reg.exe PID 2072 wrote to memory of 2496 2072 cmd.exe ipconfig.exe PID 2072 wrote to memory of 2496 2072 cmd.exe ipconfig.exe PID 2072 wrote to memory of 2496 2072 cmd.exe ipconfig.exe PID 2072 wrote to memory of 1664 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 1664 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 1664 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 1340 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 1340 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 1340 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2780 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2780 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2780 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2836 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2836 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2836 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2800 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2800 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2800 2072 cmd.exe timeout.exe PID 2072 wrote to memory of 2008 2072 cmd.exe cmd.exe PID 2072 wrote to memory of 2008 2072 cmd.exe cmd.exe PID 2072 wrote to memory of 2008 2072 cmd.exe cmd.exe PID 2072 wrote to memory of 2180 2072 cmd.exe timeout.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\dependencies\2024-1-12\auth..bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start -verb runas 'C:\Users\Admin\AppData\Local\Temp\dependencies\2024-1-12\auth..bat' am_admin2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dependencies\2024-1-12\auth..bat" am_admin3⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL ping -4 -n 1 SCFGBRBT | findstr [4⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\PING.EXEping -4 -n 1 SCFGBRBT5⤵
- Runs ping.exe
PID:2588 -
C:\Windows\system32\findstr.exefindstr [5⤵PID:2664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell Invoke-RestMethod api.ipify.org4⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-RestMethod api.ipify.org5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\system32\attrib.exeattrib "C:\ProgramData\s.exe" +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2624 -
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:2500 -
C:\Windows\system32\systeminfo.exeSystemInfo4⤵
- Gathers system information
PID:2460 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\system32\net.exenet user4⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵PID:1872
-
C:\Windows\system32\reg.exereg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run4⤵
- Modifies registry key
PID:1640 -
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2496 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1664 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1340 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2780 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2836 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2800 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles"4⤵PID:2008
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2180 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1420 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1076 -
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\"4⤵PID:1764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files (x86)\Steam\"4⤵PID:2972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files\Steam\"4⤵PID:2144
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a6b03e54313eceb5bd91629e5b74740c
SHA1e78ef72e2e0c13ce30de6dbdf6bf0ea4ed65af13
SHA256fccdf715f512a876fa02e54527bb8dddd00ec06be2e58311e76060ecf7c4b3e5
SHA512f5d98ea4eb708234804495acf2cdd62ab4eeecac7a9abe989f051959cc8483317375be712cdbe03c7112868cb817d87bdc88d63dd1724ce8a1e4af3e52e952d4