Analysis
-
max time kernel
55s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 22:12
Behavioral task
behavioral1
Sample
Dupe V4.42.exe
Resource
win7-20240220-en
General
-
Target
Dupe V4.42.exe
-
Size
274KB
-
MD5
e69695656727b24faa0cce67b8a5a1fe
-
SHA1
b71ca6b4f9f35bfd551ebf8d09255e4c8b13cc13
-
SHA256
bce20f47da6456aa5e8ad6a47bef1e56b06efdac90e206d72edf3818e7c28bc9
-
SHA512
7ddd3bc8229ffa318b1e6a1a8b19e11d8c1088dfd4c07fccf84d1e39501c562e2adb28fd02fac257f2c5f5b25412c151c4c168dac038f55f7e1a693fd2977c66
-
SSDEEP
6144:wf+BLtABPDsth6Ej/UZkI4TjkRy5xafTyUlI1D0bft:DtK+I4TjkRyZZ1DQt
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1206974551552958464/exNVrcQItQDQp5Vif4AyKwrQX7lXQIl06vDpIAqDtX0OwImj8IH-5I460UrzegqRF6l4
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 freegeoip.app 3 freegeoip.app -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Dupe V4.42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Dupe V4.42.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3228 Dupe V4.42.exe 3228 Dupe V4.42.exe 3228 Dupe V4.42.exe 3228 Dupe V4.42.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3228 Dupe V4.42.exe Token: SeDebugPrivilege 1436 taskmgr.exe Token: SeSystemProfilePrivilege 1436 taskmgr.exe Token: SeCreateGlobalPrivilege 1436 taskmgr.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe 1436 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dupe V4.42.exe"C:\Users\Admin\AppData\Local\Temp\Dupe V4.42.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5e37caa16b2cb5b54a2a00e94539a05f4
SHA18fa1dfcfc8e2fefe0f1bd39ab34643eb89b82f9e
SHA2561e5c85f2bffe93b8be943ffad60f4bbb90786649d1c955cb7b2c3b171c420f81
SHA512d5366572a947f8b68dcf913e3a1f48bc2e602286e0b90bf1c2da81d6fed994e80e1318e607807805ac4686751e8566cae299d5e7b1f45aca4268b9b36298dd6b
-
Filesize
1KB
MD522e39d6a653c9d2898f6a0565e2ad52d
SHA17f3bc848178f08e0703b7e065943ea36352e2268
SHA256e814f470591361c16a0a68d56b45b4ad7b4457a5fa5d7cbc567ac883d981f976
SHA512c1ac6d562b7d7425bf89f72739f88651597507b0492c9858a7fd248380135881bfa14d2d3d4061712d96a0bd586c7d32c16894d75dea7347c5fbc2d94c07b570