Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 02:10

General

  • Target

    Sen24InstallerPaliaSC.exe

  • Size

    131.9MB

  • MD5

    105a7eae565ac472ac456c1b4b0a5b61

  • SHA1

    c5672809571f1cabfe1518d2791eefe4aef7affb

  • SHA256

    b07a5160659ab0a5bed5962998aace075be118381d353510125542c0d65fdd3e

  • SHA512

    34fde1aa4983b8a7f5f09fd8043857f1c42feee2880d413acd18f0f250cdefe75d7d583c271c4caac0db0b41438c28075e4336ce0d19b09610610bc9c78013ef

  • SSDEEP

    1572864:+4sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVF:3l/BkVVPBDgmPKa5Wnu3X7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe
    "C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Windows\SysWOW64\chcp.com
        chcp
        3⤵
          PID:5008
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1208
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:5032
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:1172
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1576
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2604
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
        • C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe
          "C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Sen24InstallerPaliaSC" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 --field-trial-handle=1948,i,5272178787804133099,14621864894076458522,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:2292
          • C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe
            "C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Sen24InstallerPaliaSC" --mojo-platform-channel-handle=2152 --field-trial-handle=1948,i,5272178787804133099,14621864894076458522,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4868
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4012
            • C:\Windows\SysWOW64\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:3596
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"
              2⤵
                PID:512
                • C:\Windows\SysWOW64\where.exe
                  where /r . *.sqlite
                  3⤵
                    PID:5008
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                  2⤵
                    PID:1832
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      3⤵
                      • Enumerates processes with tasklist
                      PID:3436
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /f /im msedge.exe"
                    2⤵
                      PID:4756
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im msedge.exe
                        3⤵
                        • Kills process with taskkill
                        PID:2712
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                      2⤵
                        PID:5052
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          3⤵
                          • Enumerates processes with tasklist
                          PID:3348
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /f /im msedge.exe"
                        2⤵
                          PID:968
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im msedge.exe
                            3⤵
                            • Kills process with taskkill
                            PID:1560
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"
                          2⤵
                            PID:3556
                            • C:\Windows\SysWOW64\where.exe
                              where /r . cookies.sqlite
                              3⤵
                                PID:4572
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                              2⤵
                                PID:3328
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist
                                  3⤵
                                  • Enumerates processes with tasklist
                                  PID:3884
                              • C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe
                                "C:\Users\Admin\AppData\Local\Temp\Sen24InstallerPaliaSC.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Sen24InstallerPaliaSC" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 --field-trial-handle=1948,i,5272178787804133099,14621864894076458522,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3172

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              4279e6347a341c54e5e9bcc5ccf0b55e

                              SHA1

                              54e8b5376f11426145c70cb07a47da6c7c536bfe

                              SHA256

                              1d6fb68d1b317f18ae1f506adebddc735260a7d79fc25cbe5208a66baf9611fb

                              SHA512

                              ebfa6e9a7ae45305d929c0ec75fcf2d368fa786427e533859b537b4c1a3d609f9eff313977e6c3a33acf4d06906149fdc8f3bf684d36be9c5f669867e6b722c5

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                              Filesize

                              21KB

                              MD5

                              93a483da19062753ff991653234b63ce

                              SHA1

                              56034f9d0bb52397cee67322fa877a85dba9667c

                              SHA256

                              6b1f1aff60549daa07ca538691711bc3d5b542348e346194c0aede8c8c11c71a

                              SHA512

                              e092782cd0c9967e70ff43f791de467460506ff2f0951a7fb2f9cd61b612446e673e5fd6feb17e36e2c89593ffe70389b37c13c053768fd77ab5655c85ac342c

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                              Filesize

                              21KB

                              MD5

                              462d9a665bc4a9fc4a85403fd9d94fcc

                              SHA1

                              71dab6da4d4cbd271dcce1b9ecbeff050e87efb3

                              SHA256

                              64cbb093a59c224afe5606a4a0726a9b19977346cd2d0bf0a85868315ce6fa26

                              SHA512

                              289e265193cf5d4ef1692205a345338d9e3e3b9aa1c25c236bbea7131be548c657881898aa7b1a6dc9cb407c5b0c36e7b6a40c7eab25f73829ff22c2c0007b3b

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kn31pwev.oid.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\c58a3c6e-ffd3-4a8e-a5fe-089f11dbfbe7.tmp.node

                              Filesize

                              1.5MB

                              MD5

                              851cadc466a854c946005884c2a642ea

                              SHA1

                              b0826c377bf0c81a9281c2c3a0ed3d7457bfd099

                              SHA256

                              5c5a37c3f500f4fb8f77cbae893ce9fd2702fbb2bd86cccb1efd7b7295d4ff40

                              SHA512

                              e879255b5e7a817c6e123e91bf26ca0cf3a2a32e689378f4b8f393061003a7f613164345917e955abf01f7a9ddb2b18d80e75025c1217f75ff2ab66f6a847947

                            • C:\Users\Admin\AppData\Local\Temp\d5da330b-f75a-4b08-ba51-6e186e5ba7ba.tmp.node

                              Filesize

                              95KB

                              MD5

                              857cef4f588ccf32a14fda81eacbd620

                              SHA1

                              2032d2e4f5d75a7fbd4fce6aa1a6284b9391e7ca

                              SHA256

                              3514a5f13ebaa3b4414d485f9134950b088e876bb1fbfe2d4b2c9b87fb30b629

                              SHA512

                              e90af1da2d167abb11e6721a5409b2e600f45e98cf72fefd2aa2b25b8ee53ee5518979e0cd4359cb912203795dc7be7b28753af3d46ca58b3a40113429701eb2

                            • memory/1576-98-0x000000006D010000-0x000000006D364000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1576-56-0x0000000007AC0000-0x0000000007B36000-memory.dmp

                              Filesize

                              472KB

                            • memory/1576-107-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1576-18-0x0000000003330000-0x0000000003340000-memory.dmp

                              Filesize

                              64KB

                            • memory/1576-19-0x0000000003330000-0x0000000003340000-memory.dmp

                              Filesize

                              64KB

                            • memory/1576-13-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1576-97-0x0000000007EE0000-0x0000000007F04000-memory.dmp

                              Filesize

                              144KB

                            • memory/1576-96-0x0000000007EB0000-0x0000000007EDA000-memory.dmp

                              Filesize

                              168KB

                            • memory/1576-69-0x000000006C880000-0x000000006C8CC000-memory.dmp

                              Filesize

                              304KB

                            • memory/1576-90-0x0000000007D70000-0x0000000007E13000-memory.dmp

                              Filesize

                              652KB

                            • memory/1576-65-0x0000000007D30000-0x0000000007D62000-memory.dmp

                              Filesize

                              200KB

                            • memory/1576-64-0x000000007F270000-0x000000007F280000-memory.dmp

                              Filesize

                              64KB

                            • memory/1576-59-0x00000000081C0000-0x000000000883A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/1576-57-0x0000000003330000-0x0000000003340000-memory.dmp

                              Filesize

                              64KB

                            • memory/2604-11-0x0000000002F90000-0x0000000002FC6000-memory.dmp

                              Filesize

                              216KB

                            • memory/2604-85-0x0000000007AD0000-0x0000000007AEE000-memory.dmp

                              Filesize

                              120KB

                            • memory/2604-103-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2604-21-0x0000000005480000-0x0000000005490000-memory.dmp

                              Filesize

                              64KB

                            • memory/2604-99-0x000000006D010000-0x000000006D364000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/2604-94-0x0000000007C30000-0x0000000007C3A000-memory.dmp

                              Filesize

                              40KB

                            • memory/2604-53-0x00000000065B0000-0x00000000065CE000-memory.dmp

                              Filesize

                              120KB

                            • memory/2604-67-0x000000007FDF0000-0x000000007FE00000-memory.dmp

                              Filesize

                              64KB

                            • memory/2604-68-0x000000006C880000-0x000000006C8CC000-memory.dmp

                              Filesize

                              304KB

                            • memory/2604-16-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2616-22-0x0000000004AF0000-0x0000000004B12000-memory.dmp

                              Filesize

                              136KB

                            • memory/2616-20-0x0000000004810000-0x0000000004820000-memory.dmp

                              Filesize

                              64KB

                            • memory/2616-24-0x0000000005480000-0x00000000054E6000-memory.dmp

                              Filesize

                              408KB

                            • memory/2616-40-0x00000000054F0000-0x0000000005844000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/2616-66-0x0000000007F10000-0x00000000084B4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/2616-93-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2616-23-0x0000000004C90000-0x0000000004CF6000-memory.dmp

                              Filesize

                              408KB

                            • memory/2616-58-0x0000000004810000-0x0000000004820000-memory.dmp

                              Filesize

                              64KB

                            • memory/2616-14-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2616-60-0x0000000006C60000-0x0000000006C7A000-memory.dmp

                              Filesize

                              104KB

                            • memory/2616-15-0x0000000004E50000-0x0000000005478000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/2616-54-0x0000000005B20000-0x0000000005B6C000-memory.dmp

                              Filesize

                              304KB

                            • memory/2616-55-0x00000000060C0000-0x0000000006104000-memory.dmp

                              Filesize

                              272KB

                            • memory/2616-70-0x0000000007080000-0x0000000007112000-memory.dmp

                              Filesize

                              584KB

                            • memory/2616-17-0x0000000004810000-0x0000000004820000-memory.dmp

                              Filesize

                              64KB

                            • memory/3172-131-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-133-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-132-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-138-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-137-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-140-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-139-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-142-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-141-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB

                            • memory/3172-143-0x000000000EA30000-0x000000000EA31000-memory.dmp

                              Filesize

                              4KB