Resubmissions
10-04-2024 02:25
240410-cwlljsbh99 1010-04-2024 02:25
240410-cwlasafc5v 1010-04-2024 02:25
240410-cwkn9afc5t 1010-04-2024 02:25
240410-cwkdgsfc5s 1014-10-2023 04:25
231014-e12vfagc2y 10Analysis
-
max time kernel
29s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 02:25
Behavioral task
behavioral1
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral4
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win11-20240221-en
General
-
Target
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
-
Size
289KB
-
MD5
88cfc2ccc0575567122d1d233f9eb1c3
-
SHA1
4be67d0d801197f88c14d62f4495f17e89fc471f
-
SHA256
41505242cdbf259aada52b773daeec33d239e4aefd685ba9e406d2cf2f9871a4
-
SHA512
a2dd9ab7a2fe2a6d596c78394f65956f3e8973940229b305e2d763be69ff9f27b1450b5e08ca57cd0886a873fb663daad20ca94d9262a6c80a582dfc5f2e42b7
-
SSDEEP
6144:uHClm6SWPoK5Z0EwVSmRPQp+L5v9bbSUpi:uHCnZxb8hLLSUpi
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6176004110:AAFKA5be4dMwA848HWxzYIzrzzOGIHMOJGc/sendMessage?chat_id=615133582
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Executes dropped EXE 4 IoCs
pid Process 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 5016 tor.exe 2080 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 4344 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4976 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1684 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3228 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 2080 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3228 wrote to memory of 3784 3228 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 94 PID 3228 wrote to memory of 3784 3228 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 94 PID 3784 wrote to memory of 4260 3784 cmd.exe 96 PID 3784 wrote to memory of 4260 3784 cmd.exe 96 PID 3784 wrote to memory of 1684 3784 cmd.exe 97 PID 3784 wrote to memory of 1684 3784 cmd.exe 97 PID 3784 wrote to memory of 4976 3784 cmd.exe 101 PID 3784 wrote to memory of 4976 3784 cmd.exe 101 PID 3784 wrote to memory of 2704 3784 cmd.exe 103 PID 3784 wrote to memory of 2704 3784 cmd.exe 103 PID 2704 wrote to memory of 1676 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 105 PID 2704 wrote to memory of 1676 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 105 PID 2704 wrote to memory of 5016 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 110 PID 2704 wrote to memory of 5016 2704 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 110 PID 2080 wrote to memory of 4344 2080 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 118 PID 2080 wrote to memory of 4344 2080 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Xd2c386a3a6edfe99de10f6ce6b3659c4809a" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" &&START "" "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4260
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1684
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Xd2c386a3a6edfe99de10f6ce6b3659c4809a" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4976
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2704 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp89C1.tmp" -C "C:\Users\Admin\AppData\Local\xdh16uwiax"4⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"4⤵
- Executes dropped EXE
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:4344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe.log
Filesize847B
MD53308a84a40841fab7dfec198b3c31af7
SHA14e7ab6336c0538be5dd7da529c0265b3b6523083
SHA256169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e
SHA51297521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198
-
Filesize
289KB
MD588cfc2ccc0575567122d1d233f9eb1c3
SHA14be67d0d801197f88c14d62f4495f17e89fc471f
SHA25641505242cdbf259aada52b773daeec33d239e4aefd685ba9e406d2cf2f9871a4
SHA512a2dd9ab7a2fe2a6d596c78394f65956f3e8973940229b305e2d763be69ff9f27b1450b5e08ca57cd0886a873fb663daad20ca94d9262a6c80a582dfc5f2e42b7
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.7MB
MD5814f8cba43d923834b0d0027591e52bf
SHA12814b4faa0221b252164fbf9586051c07faa050f
SHA256406d96a4788b07a0c4bda0e289d04472bc92a13f3b5b51e7478d095986735597
SHA51245d866ec699d731eb7a50669bfa2fb469652b92d92b4546d373777192bff9d2201095ec9e13079ff422b4a7a15175142aa7d2abb57aaf4262b3e837340677069
-
Filesize
5.8MB
MD55223b3619ab2a2c9161c430b622b0272
SHA183f7cb409414e4a18ee6516fdcadce22859c4862
SHA25659aa904b5c068d9e6e747037caa43c70e244493a6e44bee2aee69b6ff4089524
SHA51281890db0458f058def8cff6e859f8d6bd37837610372b360c324cf50dd4061fbef3beb1a7291fd9721aa32f7e074b6cd223c8dfe46a6766ab63a74f9f8ef3b86
-
Filesize
64B
MD5e83d0851fd02e685ecd7f2f246f441ee
SHA10594d21c863c993089e396097272f9eced7391ae
SHA25664b259a94d6607d48dd44915b1ce259616adc989a12595fab2951f262dfbf814
SHA512a458809d9fb8e93930878ecb7439e676efac8680b89a05291adc8b04a9f4c3f993e8f2369de7a162db8bacb0a31408db2ceb1548a969400bb23886f8f2edefbe
-
Filesize
4B
MD59b1c93a6864c39e48417ee486b83c387
SHA11e11402bb8df073eb04132d0b4f12fcaf5836b35
SHA25664f363361a0acc78ce6d9e6240ca840dfc9a338bab1a2fcb7c6270baf81b1f86
SHA5125a4d2f53e956c15fa8add765b7b279a020482d4744560bfe5aafe9017e9867a2eb119baa83c076a9cc8a681e44f72938cbbddb4531b027859d4c8ab8be445565
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD578f891c813fe8572fc75fc16521f7abe
SHA1d5bce71d2fa4e964dbdbcd9e5d4373a4e099fbe6
SHA256bbed8d8933d21af897fd14ed793d1c161af8330ca4c63434194cb0d82be5c2d0
SHA5120ded656909fa5c99964f4153c3fa621267191fa8c6a986d63ddaf96947c2b3a363d920c78a00a3cef0fd4463ed711621b80fcb9c5aa6f9b79f3f515ed306aa74