Analysis

  • max time kernel
    156s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 13:42

General

  • Target

    Shaderium.exe

  • Size

    154.5MB

  • MD5

    e761adc186e90af3b697917e3ca0e912

  • SHA1

    65e121f25ccb6092ede9520bccc9262561efcdc3

  • SHA256

    5b0f51c83aa249f49e19f0ad37f8bfb7948bd0b34c91aee4913e514120c548d9

  • SHA512

    9b155c83642a3f9abe4b27dd616d412886f11577cb6a1fd3f10724c6231d2d941eb2ecc334500d6566aa4e0d0c970f80d2deee54439f6a9af59a6010335b7d6c

  • SSDEEP

    1572864:CCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:oDAgZi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
    "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4684
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3280
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,138,73,170,23,96,7,202,77,133,183,117,28,233,241,50,248,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,181,118,254,150,64,134,115,122,153,93,204,120,33,160,58,119,68,147,56,127,204,41,63,180,55,135,45,145,134,246,11,44,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,202,143,25,119,193,233,113,166,240,199,243,158,136,122,229,167,45,210,136,16,6,218,151,120,123,161,106,115,191,107,148,241,48,0,0,0,45,104,76,247,52,41,126,156,236,75,176,174,222,75,14,82,120,30,180,185,252,96,94,228,234,116,25,141,94,31,56,59,149,191,190,229,49,139,120,96,15,217,4,126,80,242,12,39,64,0,0,0,39,254,22,72,164,171,107,10,215,116,174,228,58,103,229,56,248,209,234,55,1,138,208,66,178,3,81,248,134,3,242,136,248,202,216,240,61,187,70,236,221,144,50,43,20,105,13,42,104,141,23,204,221,26,249,183,148,91,173,177,228,162,146,242), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,138,73,170,23,96,7,202,77,133,183,117,28,233,241,50,248,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,181,118,254,150,64,134,115,122,153,93,204,120,33,160,58,119,68,147,56,127,204,41,63,180,55,135,45,145,134,246,11,44,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,202,143,25,119,193,233,113,166,240,199,243,158,136,122,229,167,45,210,136,16,6,218,151,120,123,161,106,115,191,107,148,241,48,0,0,0,45,104,76,247,52,41,126,156,236,75,176,174,222,75,14,82,120,30,180,185,252,96,94,228,234,116,25,141,94,31,56,59,149,191,190,229,49,139,120,96,15,217,4,126,80,242,12,39,64,0,0,0,39,254,22,72,164,171,107,10,215,116,174,228,58,103,229,56,248,209,234,55,1,138,208,66,178,3,81,248,134,3,242,136,248,202,216,240,61,187,70,236,221,144,50,43,20,105,13,42,104,141,23,204,221,26,249,183,148,91,173,177,228,162,146,242), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:536
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,138,73,170,23,96,7,202,77,133,183,117,28,233,241,50,248,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,214,29,44,246,10,41,245,102,92,133,84,105,79,159,167,253,113,214,254,42,148,23,105,248,221,101,102,8,180,253,144,145,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,206,44,177,76,133,109,135,200,105,85,255,147,93,172,212,225,203,197,137,152,40,232,160,75,200,234,128,85,175,59,143,161,48,0,0,0,119,45,81,237,237,209,141,147,81,233,79,13,201,207,210,114,108,184,77,52,19,28,251,16,97,125,94,254,222,139,14,73,17,122,59,103,236,190,171,193,184,93,248,17,185,39,218,94,64,0,0,0,243,46,67,128,172,69,8,93,24,179,123,150,56,162,189,20,8,211,199,240,126,102,53,241,33,150,97,248,95,1,122,177,9,93,137,6,85,72,255,131,130,71,179,231,226,149,110,225,185,250,73,15,111,129,11,239,237,85,144,166,165,243,238,3), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,138,73,170,23,96,7,202,77,133,183,117,28,233,241,50,248,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,214,29,44,246,10,41,245,102,92,133,84,105,79,159,167,253,113,214,254,42,148,23,105,248,221,101,102,8,180,253,144,145,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,206,44,177,76,133,109,135,200,105,85,255,147,93,172,212,225,203,197,137,152,40,232,160,75,200,234,128,85,175,59,143,161,48,0,0,0,119,45,81,237,237,209,141,147,81,233,79,13,201,207,210,114,108,184,77,52,19,28,251,16,97,125,94,254,222,139,14,73,17,122,59,103,236,190,171,193,184,93,248,17,185,39,218,94,64,0,0,0,243,46,67,128,172,69,8,93,24,179,123,150,56,162,189,20,8,211,199,240,126,102,53,241,33,150,97,248,95,1,122,177,9,93,137,6,85,72,255,131,130,71,179,231,226,149,110,225,185,250,73,15,111,129,11,239,237,85,144,166,165,243,238,3), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:900
    • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
      "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Shaderium" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 --field-trial-handle=1964,i,16770073518353916753,2332833159929789151,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:4360
      • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
        "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Shaderium" --mojo-platform-channel-handle=2264 --field-trial-handle=1964,i,16770073518353916753,2332833159929789151,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:3948
        • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
          "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Shaderium" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2620 --field-trial-handle=1964,i,16770073518353916753,2332833159929789151,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          PID:3068
        • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
          "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Shaderium" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 --field-trial-handle=1964,i,16770073518353916753,2332833159929789151,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1828

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              3KB

              MD5

              f48896adf9a23882050cdff97f610a7f

              SHA1

              4c5a610df62834d43f470cae7e851946530e3086

              SHA256

              3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

              SHA512

              16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              e86a2f4d6dec82df96431112380a87e6

              SHA1

              2dc61fae82770528bee4fe5733a8ac3396012e79

              SHA256

              dde11341854008e550d48a18f4880f7e462f5a75f0a6f8c09cf7b0761a425f3a

              SHA512

              5f127e7c81c480ad134eacfda3f5de738902b879fd4e85ddc663c050c6db748ac3f9d228ca26ddb37df06039df6741d2b774c0201388edf332fe063c464397a5

            • C:\Users\Admin\AppData\Local\Temp\67261710-d498-411b-8d43-0c13c9b34728.tmp.node

              Filesize

              1.8MB

              MD5

              3072b68e3c226aff39e6782d025f25a8

              SHA1

              cf559196d74fa490ac8ce192db222c9f5c5a006a

              SHA256

              7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

              SHA512

              61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ocnzpber.jzh.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\cookies.zip

              Filesize

              22B

              MD5

              76cdb2bad9582d23c1f6f4d868218d6c

              SHA1

              b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

              SHA256

              8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

              SHA512

              5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

            • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Users\Admin\AppData\Roaming\Shaderium\Network\Network Persistent State

              Filesize

              502B

              MD5

              c6d1b1f47970f4862081f3ab3fb372bd

              SHA1

              00138d1062c3f24b08f1214268841be95c276607

              SHA256

              d5c4ed3668221c97a80cb322e61a6724e5349ecbae8dad9bfce1e7401d7eea00

              SHA512

              6d0bdad85a9973d46c66f370c1b313ccba58f375bee63f2455177c1d8c25a005550c59fb5bd8da211295f64aad716a6131179a84b726473ff2b0e509f4b50e3a

            • C:\Users\Admin\AppData\Roaming\Shaderium\Network\Network Persistent State~RFe58cc34.TMP

              Filesize

              59B

              MD5

              2800881c775077e1c4b6e06bf4676de4

              SHA1

              2873631068c8b3b9495638c865915be822442c8b

              SHA256

              226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

              SHA512

              e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

            • memory/536-16-0x00007FFFE05F0000-0x00007FFFE10B1000-memory.dmp

              Filesize

              10.8MB

            • memory/536-23-0x00007FFFE05F0000-0x00007FFFE10B1000-memory.dmp

              Filesize

              10.8MB

            • memory/536-19-0x00000195CCD50000-0x00000195CCDA0000-memory.dmp

              Filesize

              320KB

            • memory/536-18-0x00000195B2350000-0x00000195B2360000-memory.dmp

              Filesize

              64KB

            • memory/536-17-0x00000195B2350000-0x00000195B2360000-memory.dmp

              Filesize

              64KB

            • memory/536-15-0x00000195CC940000-0x00000195CC962000-memory.dmp

              Filesize

              136KB

            • memory/900-42-0x00007FFFE05F0000-0x00007FFFE10B1000-memory.dmp

              Filesize

              10.8MB

            • memory/900-39-0x000002243E550000-0x000002243E560000-memory.dmp

              Filesize

              64KB

            • memory/900-28-0x000002243E550000-0x000002243E560000-memory.dmp

              Filesize

              64KB

            • memory/900-27-0x000002243E550000-0x000002243E560000-memory.dmp

              Filesize

              64KB

            • memory/900-26-0x00007FFFE05F0000-0x00007FFFE10B1000-memory.dmp

              Filesize

              10.8MB

            • memory/1828-142-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-140-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-141-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-147-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-146-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-149-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-148-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-151-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-150-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB

            • memory/1828-152-0x000002163AB00000-0x000002163AB01000-memory.dmp

              Filesize

              4KB