Resubmissions
22-02-2024 23:54
240222-3x6k8agf4w 1022-02-2024 23:49
240222-3vb9lagf2t 1021-02-2024 19:26
240221-x5j5ased59 10Analysis
-
max time kernel
34s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
a064b524a661ce56c911fb3b184c1b8d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a064b524a661ce56c911fb3b184c1b8d.exe
Resource
win10v2004-20240221-en
General
-
Target
a064b524a661ce56c911fb3b184c1b8d.exe
-
Size
61KB
-
MD5
a064b524a661ce56c911fb3b184c1b8d
-
SHA1
a39aaf5834308ce443b56d80b7cf28ad9eb8f2f2
-
SHA256
3d782b5f5304e058161dce64bf27fc5c28af23675ce6db1fc46386fb8f532c2b
-
SHA512
397fd0aa5e5bbb37e2cc703a81335eabdeada48fde13e100b876e7fcd3c79218dc59e533f000e7dbb1e0dc9986d98617249d327c42e9c5b19f7aeb4e2f0a238b
-
SSDEEP
768:gnbyhKtnWoRxqf7GNI4r8YLDwUzc80gmq3oP/oDY:gnbRw7Gxpr/0O8/ok
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\a064b524a661ce56c911fb3b184c1b8d.exe\"" a064b524a661ce56c911fb3b184c1b8d.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini a064b524a661ce56c911fb3b184c1b8d.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini a064b524a661ce56c911fb3b184c1b8d.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a064b524a661ce56c911fb3b184c1b8d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 5 discord.com 6 discord.com 7 discord.com 8 discord.com 26 discord.com 4 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 812 a064b524a661ce56c911fb3b184c1b8d.exe 812 a064b524a661ce56c911fb3b184c1b8d.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 812 a064b524a661ce56c911fb3b184c1b8d.exe Token: SeIncreaseQuotaPrivilege 2556 WMIC.exe Token: SeSecurityPrivilege 2556 WMIC.exe Token: SeTakeOwnershipPrivilege 2556 WMIC.exe Token: SeLoadDriverPrivilege 2556 WMIC.exe Token: SeSystemProfilePrivilege 2556 WMIC.exe Token: SeSystemtimePrivilege 2556 WMIC.exe Token: SeProfSingleProcessPrivilege 2556 WMIC.exe Token: SeIncBasePriorityPrivilege 2556 WMIC.exe Token: SeCreatePagefilePrivilege 2556 WMIC.exe Token: SeBackupPrivilege 2556 WMIC.exe Token: SeRestorePrivilege 2556 WMIC.exe Token: SeShutdownPrivilege 2556 WMIC.exe Token: SeDebugPrivilege 2556 WMIC.exe Token: SeSystemEnvironmentPrivilege 2556 WMIC.exe Token: SeRemoteShutdownPrivilege 2556 WMIC.exe Token: SeUndockPrivilege 2556 WMIC.exe Token: SeManageVolumePrivilege 2556 WMIC.exe Token: 33 2556 WMIC.exe Token: 34 2556 WMIC.exe Token: 35 2556 WMIC.exe Token: SeIncreaseQuotaPrivilege 2556 WMIC.exe Token: SeSecurityPrivilege 2556 WMIC.exe Token: SeTakeOwnershipPrivilege 2556 WMIC.exe Token: SeLoadDriverPrivilege 2556 WMIC.exe Token: SeSystemProfilePrivilege 2556 WMIC.exe Token: SeSystemtimePrivilege 2556 WMIC.exe Token: SeProfSingleProcessPrivilege 2556 WMIC.exe Token: SeIncBasePriorityPrivilege 2556 WMIC.exe Token: SeCreatePagefilePrivilege 2556 WMIC.exe Token: SeBackupPrivilege 2556 WMIC.exe Token: SeRestorePrivilege 2556 WMIC.exe Token: SeShutdownPrivilege 2556 WMIC.exe Token: SeDebugPrivilege 2556 WMIC.exe Token: SeSystemEnvironmentPrivilege 2556 WMIC.exe Token: SeRemoteShutdownPrivilege 2556 WMIC.exe Token: SeUndockPrivilege 2556 WMIC.exe Token: SeManageVolumePrivilege 2556 WMIC.exe Token: 33 2556 WMIC.exe Token: 34 2556 WMIC.exe Token: 35 2556 WMIC.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 812 wrote to memory of 2328 812 a064b524a661ce56c911fb3b184c1b8d.exe 28 PID 812 wrote to memory of 2328 812 a064b524a661ce56c911fb3b184c1b8d.exe 28 PID 812 wrote to memory of 2328 812 a064b524a661ce56c911fb3b184c1b8d.exe 28 PID 812 wrote to memory of 2328 812 a064b524a661ce56c911fb3b184c1b8d.exe 28 PID 2328 wrote to memory of 2556 2328 cmd.exe 30 PID 2328 wrote to memory of 2556 2328 cmd.exe 30 PID 2328 wrote to memory of 2556 2328 cmd.exe 30 PID 2328 wrote to memory of 2556 2328 cmd.exe 30 PID 1088 wrote to memory of 2968 1088 chrome.exe 34 PID 1088 wrote to memory of 2968 1088 chrome.exe 34 PID 1088 wrote to memory of 2968 1088 chrome.exe 34 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 3068 1088 chrome.exe 35 PID 1088 wrote to memory of 528 1088 chrome.exe 39 PID 1088 wrote to memory of 528 1088 chrome.exe 39 PID 1088 wrote to memory of 528 1088 chrome.exe 39 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36 PID 1088 wrote to memory of 1884 1088 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\a064b524a661ce56c911fb3b184c1b8d.exe"C:\Users\Admin\AppData\Local\Temp\a064b524a661ce56c911fb3b184c1b8d.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6359758,0x7fef6359768,0x7fef63597782⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:22⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:82⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2224 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:12⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:12⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:82⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1448 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1084 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3744 --field-trial-handle=1352,i,13676323701685610398,11096733849019896021,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD54284dd85519a5869ae913d47528f2cf4
SHA118bfdf4f391fdabedabd4a66406d526fdbcb8c74
SHA2560c8be4973191fe13517b8d2b846d0a8b7733f3d2e255f54bd88d11a1cfa48763
SHA512d5f86d7686628c3bf0727167c1a2089bf250be83f06c35d128fbebd245c8a991f610b2acd0f8f6053fb492381dd036d5216210d9e377033566064adba84f7c68
-
Filesize
4KB
MD57c1f660113d2e7be7a428ca91a762cd0
SHA13bbf7e589b3fa80547c31b2894a6c43787e5aed0
SHA25692eacbcd06599bfd4f039bdcb1d4d455fc9f80315cfc689755d3397e9bf14ea9
SHA5120909bf9b597b12ec067d0e183e88b42f12c900cc99494f6747260da8c9dda54e4e038efb9e97ad1de21e1d74aab92d9c8ab6f8c6eb6f2953a55becf3981ed8d9
-
Filesize
4KB
MD5dfe33973202125ec3c733d24a4bd7c6e
SHA17feaca66d1765d3d70b1f859a05d1ec88898872f
SHA2568a6a347a22220abfb8323aa7b097591d6fa31fe5f946dcc0517d22962f5f605a
SHA5126ef574741073e114c9aa702b8d789f02c68fe342959a99ccdfa8b0b252f55b6cff27ebbb92c99fccbed9028528e451ac3527857566eb9ca72fd8af9c576efed7
-
Filesize
4KB
MD54082a76ed018641f42125332c3496bf0
SHA14ac81b81d45704faeb568060e025839c8eacb7b0
SHA256ba3446ac0f29ecf6f9b513f1a7cff30d8055b83bf1d8ea860929457c098bc466
SHA512747aa7731ae797db6d84cac945a6ddf03a6cca7eb5fd0f071cd8b0539d6e8c49f002d0cc5da8d4919dbec0229ca9f97514d1dae56c168cec8d2d0a8d137a6748
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2