Analysis
-
max time kernel
28s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 22:00
Behavioral task
behavioral1
Sample
gamesense.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
loader+vacbypass.exe
Resource
win10v2004-20240226-en
General
-
Target
gamesense.exe
-
Size
275KB
-
MD5
06d26e80e55344a8a483c357d2c93361
-
SHA1
791f3e4a55785b940dfd335b9bf408a276b95258
-
SHA256
0e9d0fb06c0f889d46fac8b5d9afeb4a503ac39a73742729ec38a83cf48c3623
-
SHA512
504bea28b846edb81050792dc309a79d17c312df58b3fb363ecd6b281703c575ac9e643c91749fe15c9bb344de0124fe160e0e1910583857919c8fdc3d5750fd
-
SSDEEP
6144:Bf+BLCABPCSyu0Y6/8eaxLaqJCVImMOAle0EO+J:8yvZaxLaDVvgle3J
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1140809162201243699/btqO8cRb46bEQDfduagpAMVv7owTAQ07NMRmYHKOBoLrPmi8MTwUvTQMbnvuk2E4cchn
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 myexternalip.com 7 myexternalip.com -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 gamesense.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier gamesense.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2832 gamesense.exe 2832 gamesense.exe 2832 gamesense.exe 2832 gamesense.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3428 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2832 gamesense.exe Token: SeDebugPrivilege 3428 taskmgr.exe Token: SeSystemProfilePrivilege 3428 taskmgr.exe Token: SeCreateGlobalPrivilege 3428 taskmgr.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe 3428 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gamesense.exe"C:\Users\Admin\AppData\Local\Temp\gamesense.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e326b8d1b860bc755f6ed57d4de1cd3b
SHA1c6302a71de6dfc307bab0446f8a173e6aefa5f15
SHA256a3669df2c7f8fb6c7d923909d7efd19c848123355e095aa8cac297133ead8690
SHA512b11036cc9550f11dfea5902499463cd6f938b94093748eba8881edcf5182ed1466a66636c460a7ab841b7c351e0de3d229f4f4aedc3e8422577b9ac468853832