Resubmissions

24/02/2024, 15:39

240224-s3pjsafg69 7

24/02/2024, 14:20

240224-rnqmvseb57 7

Analysis

  • max time kernel
    1803s
  • max time network
    1506s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/02/2024, 15:39

General

  • Target

    rush.exe

  • Size

    154.5MB

  • MD5

    b5261fd859757d5419ba332a2b97901b

  • SHA1

    cea7201fff575ae33ad8d4ab2adc923f2e6bba43

  • SHA256

    cc6fb688c56d470763291ec24d591b6f0c26ff14b0b9a27b1365129eae913027

  • SHA512

    269b3f9861404f78e58b0e51a9918531e75317ed8d2f25dfb4f11c11598824ff9097a611fe2f0c056190e920e5de8ed234fbda508adc44e037ddf71be266f1d4

  • SSDEEP

    1572864:wCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:KDAgZi

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rush.exe
    "C:\Users\Admin\AppData\Local\Temp\rush.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3804
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:568
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,125,72,131,190,46,209,201,73,187,93,145,136,112,60,127,30,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,78,204,91,228,188,238,119,10,238,97,125,48,89,6,52,45,131,233,214,86,155,203,109,143,152,184,44,241,166,181,210,173,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,254,235,175,227,53,206,80,36,224,160,254,65,112,31,30,206,108,35,1,141,136,149,128,206,203,198,251,59,148,193,201,43,48,0,0,0,156,212,158,88,47,128,111,245,191,235,137,103,62,52,247,38,9,225,56,189,96,147,137,45,47,189,162,118,105,23,28,204,66,164,216,222,192,59,7,217,226,59,87,162,191,105,182,4,64,0,0,0,42,205,242,10,53,23,70,97,34,237,79,55,67,204,163,193,217,154,230,185,176,4,137,114,12,145,183,35,255,103,50,92,230,12,15,153,26,132,95,106,246,56,245,45,98,158,28,188,114,193,113,13,190,170,212,151,159,98,69,190,39,45,54,20), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,125,72,131,190,46,209,201,73,187,93,145,136,112,60,127,30,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,78,204,91,228,188,238,119,10,238,97,125,48,89,6,52,45,131,233,214,86,155,203,109,143,152,184,44,241,166,181,210,173,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,254,235,175,227,53,206,80,36,224,160,254,65,112,31,30,206,108,35,1,141,136,149,128,206,203,198,251,59,148,193,201,43,48,0,0,0,156,212,158,88,47,128,111,245,191,235,137,103,62,52,247,38,9,225,56,189,96,147,137,45,47,189,162,118,105,23,28,204,66,164,216,222,192,59,7,217,226,59,87,162,191,105,182,4,64,0,0,0,42,205,242,10,53,23,70,97,34,237,79,55,67,204,163,193,217,154,230,185,176,4,137,114,12,145,183,35,255,103,50,92,230,12,15,153,26,132,95,106,246,56,245,45,98,158,28,188,114,193,113,13,190,170,212,151,159,98,69,190,39,45,54,20), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4372
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,125,72,131,190,46,209,201,73,187,93,145,136,112,60,127,30,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,209,197,57,139,0,88,30,164,237,252,255,9,81,225,41,23,115,14,159,131,196,220,7,189,52,90,184,120,26,150,38,50,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,170,67,115,110,104,5,223,65,247,16,147,49,146,23,59,222,244,134,157,97,238,66,237,159,140,48,243,17,45,147,177,169,48,0,0,0,180,13,126,120,197,93,223,63,166,126,22,147,253,160,16,112,17,58,58,37,127,28,80,224,231,225,121,15,73,56,141,82,124,6,196,196,30,178,157,110,188,213,84,103,24,114,6,191,64,0,0,0,159,168,132,105,245,153,182,93,143,196,252,134,155,28,101,93,191,172,130,141,20,196,122,5,57,96,46,206,155,52,82,6,118,173,79,167,71,11,55,26,77,47,88,180,2,19,78,22,108,111,126,139,178,112,103,34,33,189,30,196,213,72,203,70), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,125,72,131,190,46,209,201,73,187,93,145,136,112,60,127,30,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,209,197,57,139,0,88,30,164,237,252,255,9,81,225,41,23,115,14,159,131,196,220,7,189,52,90,184,120,26,150,38,50,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,170,67,115,110,104,5,223,65,247,16,147,49,146,23,59,222,244,134,157,97,238,66,237,159,140,48,243,17,45,147,177,169,48,0,0,0,180,13,126,120,197,93,223,63,166,126,22,147,253,160,16,112,17,58,58,37,127,28,80,224,231,225,121,15,73,56,141,82,124,6,196,196,30,178,157,110,188,213,84,103,24,114,6,191,64,0,0,0,159,168,132,105,245,153,182,93,143,196,252,134,155,28,101,93,191,172,130,141,20,196,122,5,57,96,46,206,155,52,82,6,118,173,79,167,71,11,55,26,77,47,88,180,2,19,78,22,108,111,126,139,178,112,103,34,33,189,30,196,213,72,203,70), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4784
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "mshta "javascript:new ActiveXObject('WScript.Shell').Popup('An error occurred while downloading files. Please try again later.', 0, 'Error', 16);close()""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\system32\mshta.exe
        mshta "javascript:new ActiveXObject('WScript.Shell').Popup('An error occurred while downloading files. Please try again later.', 0, 'Error', 16);close()"
        3⤵
          PID:3076
      • C:\Users\Admin\AppData\Local\Temp\rush.exe
        "C:\Users\Admin\AppData\Local\Temp\rush.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\rush" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1816,i,2903270283612173048,2271400645320982350,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:1516
        • C:\Users\Admin\AppData\Local\Temp\rush.exe
          "C:\Users\Admin\AppData\Local\Temp\rush.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\rush" --mojo-platform-channel-handle=2120 --field-trial-handle=1816,i,2903270283612173048,2271400645320982350,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
            PID:1280
          • C:\Users\Admin\AppData\Local\Temp\rush.exe
            "C:\Users\Admin\AppData\Local\Temp\rush.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\rush" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 --field-trial-handle=1816,i,2903270283612173048,2271400645320982350,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1104

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          f69f145ee494b2d67c5d50108c862d4a

          SHA1

          68f36b9bd553beb2a7eec5f4a8fef317703c77e1

          SHA256

          06dd71fdfda7e319131bf98bd21dc6bee9a480736ab688e52bafe10074f00fc7

          SHA512

          302489f1e2676d83cf9cf92d378176a230f15975af12e2a2a50d9c057f4de0fc2c22f68a9390f5b337eaa10ea77366a1a79e71808de1e7a7c4e6432aeb75c530

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          64726b3d39febd6825a6dd0419be008b

          SHA1

          9dc2c08dfe4223cc394a14582f304681a03b5571

          SHA256

          833c6348ccf6885385f25f0797b770b390f29bf4120053b7975aef0fbf7fd62c

          SHA512

          900440b8a5fb8afb525dd7b1a0344175703a402ae667573bd2cd77ad743fc7454929cd470375c668d24f9d8986198fc824fee002db63e4f96709f6850eacab45

        • C:\Users\Admin\AppData\Local\Temp\5b50a973-cd15-4215-808a-61f775d60806.tmp.node

          Filesize

          137KB

          MD5

          04bfbfec8db966420fe4c7b85ebb506a

          SHA1

          939bb742a354a92e1dcd3661a62d69e48030a335

          SHA256

          da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

          SHA512

          4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

        • C:\Users\Admin\AppData\Local\Temp\80aa9988-1fd9-4a34-812a-ec833dc06c81.tmp.node

          Filesize

          896KB

          MD5

          0838538c5543c0b4a687d94dbc068105

          SHA1

          b052e47b1d39a63c0fe9a65ffbf87ecbe6ad6a55

          SHA256

          5bd9116e8d288c0777f2fb8654ebf5bc7ea14cbdc42796e4e74b466d461d3a01

          SHA512

          06cde8cc800b5ad10b3211f64d0a13813659e7ec3e80d8133e239ecf8be1f2d48e1cfe3a8da1ee1600de180f48e0f375d8831ad79f7ee37aa2f9fe1de5411ca1

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jilpshgp.bkl.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\importantfiles.zip

          Filesize

          22B

          MD5

          76cdb2bad9582d23c1f6f4d868218d6c

          SHA1

          b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

          SHA256

          8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

          SHA512

          5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

        • memory/1104-83-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-76-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-88-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-87-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-86-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-84-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-85-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-82-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-78-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/1104-77-0x00000204D31A0000-0x00000204D31A1000-memory.dmp

          Filesize

          4KB

        • memory/4372-19-0x00007FF8E04C0000-0x00007FF8E0F82000-memory.dmp

          Filesize

          10.8MB

        • memory/4372-22-0x0000020CD98F0000-0x0000020CD9900000-memory.dmp

          Filesize

          64KB

        • memory/4372-20-0x0000020CD98F0000-0x0000020CD9900000-memory.dmp

          Filesize

          64KB

        • memory/4372-10-0x0000020CD9890000-0x0000020CD98B2000-memory.dmp

          Filesize

          136KB

        • memory/4372-21-0x0000020CD98F0000-0x0000020CD9900000-memory.dmp

          Filesize

          64KB

        • memory/4372-27-0x00007FF8E04C0000-0x00007FF8E0F82000-memory.dmp

          Filesize

          10.8MB

        • memory/4372-23-0x0000020CD9D30000-0x0000020CD9D80000-memory.dmp

          Filesize

          320KB

        • memory/4784-45-0x00007FF8E04C0000-0x00007FF8E0F82000-memory.dmp

          Filesize

          10.8MB

        • memory/4784-42-0x00000266BD910000-0x00000266BD920000-memory.dmp

          Filesize

          64KB

        • memory/4784-32-0x00000266BD910000-0x00000266BD920000-memory.dmp

          Filesize

          64KB

        • memory/4784-31-0x00000266BD910000-0x00000266BD920000-memory.dmp

          Filesize

          64KB

        • memory/4784-30-0x00007FF8E04C0000-0x00007FF8E0F82000-memory.dmp

          Filesize

          10.8MB