Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe
Resource
win7-20231129-en
General
-
Target
3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe
-
Size
1.8MB
-
MD5
ed80d8a90816388ce6606d25bde093e6
-
SHA1
6675972f9186a524ace402d17ce10d3288badb15
-
SHA256
3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63
-
SHA512
189c06b66130245744e4b3470ab600f11244550f7a32a803a9ca018766f2b56ba8494dda2c2d2307a3c91df25dd7309bfc6240ec2b0f65ca761ef8807ec380c5
-
SSDEEP
49152:vx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WAg/snji6attJM:vvbjVkjjCAzJREnW6at
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 1596 alg.exe 1232 DiagnosticsHub.StandardCollector.Service.exe 3968 fxssvc.exe 3084 elevation_service.exe 3036 elevation_service.exe 2888 maintenanceservice.exe 1924 msdtc.exe 2112 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\c0f5f9fb3e2edcd.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Windows\system32\fxssvc.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Windows\System32\msdtc.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\psmachine.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_mr.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{1342F81A-D5C5-42B4-A5E8-933F7759DA30}\chrome_installer.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_ar.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUT369C.tmp 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdate.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_pt-PT.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaws.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_uk.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_cs.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_es.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_hu.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_ro.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File created C:\Program Files (x86)\Google\Temp\GUM369B.tmp\goopdateres_ur.dll 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 676 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4900 3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe Token: SeAuditPrivilege 3968 fxssvc.exe Token: SeDebugPrivilege 1596 alg.exe Token: SeDebugPrivilege 1596 alg.exe Token: SeDebugPrivilege 1596 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe"C:\Users\Admin\AppData\Local\Temp\3ac53779069431944ac4f1b744e2e5c6b0a94ccc8dc73a038d0b2eb159158f63.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4576
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3084
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3036
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2888
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1924
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1320 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5e0b94a6b00279c61825515cd7df436ac
SHA150bd2fc5aed46bd9a1e35ddfd89aeae15bd98d7e
SHA2564ba22cecdee539becc940d2934edaff802d31f82b3b7bef04e4711e7bcbf66f7
SHA512cadf33b6450852a33ffe1c6c21db8cd48f198b2c6f6e0c2e1768550c16bac67b973678085a3ffaccdd5a386e985b3d61a74fd780811dbc24220e9db015d500b9
-
Filesize
1.4MB
MD5f791ec0457682bddc4031e48315ab7b7
SHA1308d2db74ea95939a7cac411a502e166ff15f756
SHA2561ba3785672eb69c6baa1760d96b4da47eadb0eec357b52d7d777e20b7f7d8fb8
SHA512e0a2999b4615c7c88c8f41595736ee03f8daa9093911cf2781a9afaa4434f57a00b0ad39cb919811250ddbdd1d85fe9fcc8ca74bd37862c6372b584f7695d6b9
-
Filesize
1.4MB
MD5cfe8f9452b0cb54d1ad7617a606979b3
SHA162e003c91f2e91dfacdeed91a6173ecbcf52ada4
SHA256177b1b2a50b9236dda12fcd4f6290999431d7dc4d1771940f36e3bc219f52444
SHA512c2a5440095c43738c5229410315c08f35c1932f775d934ce17fd92356eead8ef1403711477404b9af412ac5b7a1611427493980f9eea068a246653fe70174e6c
-
Filesize
2.1MB
MD55ad3e3c558f2192c08b0e1834ce82895
SHA12f84c0fe0bad23b3aadb090948de507b5f6c3c33
SHA2561e35d349c9b7e5a747075e0ff461b30fac4519ad55ceb73bba0d7cf795aac061
SHA512ec55192a8e2c971cec945d7c9a7eccd4728a539a6d474cc81be2dad8d951cd6119dbf1ff692178a55b1b091d65157fb170742cf9e6f2998eb53b1f1eed23647a
-
Filesize
1.3MB
MD5b46a9da9a9d819fcdccf8bf3f61a3761
SHA1f1e3fcaf2401fc901a2c47aca9ee7de9f5764798
SHA256c151bb37594164ea3dcc32c752668913ee62aa16580050457bf6dfaec670f0fb
SHA512b8a7e8b20f391930124c57d59d4da7244d2f664956c5bd68dbba9e7697de48a644a2272a8122c53e6f8b503ac57d85a5d2a68def2781e07c61c6ce9fd07e1319
-
Filesize
1.2MB
MD5e9f774da350b8a13cadfbfd18fccb71f
SHA16ec17334d7b23565c6a0cce1fd65a0874a12dc2f
SHA256bf9361b0863da59270b9c5d1cf547385c355f0d43b04da3e64f785f60407f8c1
SHA512d95ba8eedd29f237726ea8fa41f7e3af8510e0de1ff26a29a95b4d2e0a5f9f528ba605954f0b86dad6c4f08d9ae034b9435b9d2e17e2be66e9ab3ff91d28470f
-
Filesize
1.3MB
MD58d4977de19a691424b69eb5e05812ea1
SHA1e815b3784c383c08806a62e8a5bf6b3f9b905f2f
SHA256ed6e391f5ef03cb64d6229be9553dbe836306f75ff0363d103dfcb64612eddf3
SHA512e83e55d72e139c37db1561c07736e8e7bd1e6e00d1f9a9fadb13f32ad848a4d3379711e3202bcfe41412c14305d778a0f0ab240a92254047a89f3b05e320fc0c
-
Filesize
1.3MB
MD593ade95037c0979a59fdf604743740f4
SHA1d59468771a0ffa76bf06b849e5412deef1377d94
SHA256ef08dac7fbb0f2e488c20d0c3e3784cfa5dc2bcaae859a738dd53b84f5013778
SHA51287cc09aea38acf3796024923d5fb4791b1862163c3fd7ce5ae92ea474da5bea79353e51a5ef9fb9cbe9c58c19e9723e74c3b805faf2ff815f31fd2a417127135
-
Filesize
264KB
MD5078b46021d3ddea0d657840db323931d
SHA120b1e4bddde13ed17d5da94cb9f7a97279160c90
SHA256e1195b5e20105a580930d6cc31727f45ea56ce6e7a672ef06da5e4e0ff8c5d40
SHA5123f1c57a4bac1fcbd3d33425a7efb5022b14c6b8ba3d5bddf42bbcf8e3c7beb2f0dac2fc4560dc333519e6ceaed51333bea21aa96dcc8b0d070df3de18e1bf514
-
Filesize
31KB
MD501281e708fca667b89f14285f850f86f
SHA16df72cf4215a07d254f86ac2095afe8748808e05
SHA2565b3a33452e44d80aad16a3f3e8ea899dd5e84c17ed45f359cf8fa1e9acd90224
SHA5129f1e2be71e6baaef0c7184f200b863c7d208102a0262a3149f5bb42b321624cc2a6a5a1fe188579510e6c743f42be7b372c513cb421c8c458beb5496876187aa