Analysis

  • max time kernel
    15s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 01:08

General

  • Target

    02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7.exe

  • Size

    74KB

  • MD5

    4282fd4222138bfc7229a802d63d9146

  • SHA1

    cdebdf832907a16dba3cb85c1cd60e1db1d31535

  • SHA256

    02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7

  • SHA512

    f6a1748789def0598f7c27c74594c6144777c714c929acc4180aa5cde000e871b1a887702dc86b2b4ceed4086201b113c2d7c26dc372bb4c41ba34a1e69e81d7

  • SSDEEP

    768:fXqien69IBx4TOLRb56fh3NgBzIeOCP+MOFSIB/JPgi011UAbebp3EaPXHMV1jzB:/en69Wl1jX/YpgCqhj+Dib0k

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 30 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7.exe
    "C:\Users\Admin\AppData\Local\Temp\02c81055545d2e262713b1e5d233c892db198943001ee869f46be1cd1e36abd7.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Users\Admin\AppData\Local\Temp\ServiceHub.IdentityHost.exe
      "C:\Users\Admin\AppData\Local\Temp\ServiceHub.IdentityHost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      PID:3284
    • C:\Users\Admin\AppData\Local\Temp\SQL Local Service.exe
      "C:\Users\Admin\AppData\Local\Temp\SQL Local Service.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      PID:2672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\SQL Local Service.exe

          Filesize

          15KB

          MD5

          e7a0ec44da1d22945130cbf0a1f90350

          SHA1

          0f863e45faa2a5931f729ef85dd8614e96f1b89e

          SHA256

          684931cd4aa538c525368d2bdc724fc623009fb43ca3000bb654a64c46d0eeb9

          SHA512

          3bb32e5f4d9f444f0a35decca4dcc88ec7008a6e81ac94a867b93685d343c0751a42bb905d1ff4f76f7e40e66083ff0c78f71dc1b1ccbd722753e1787ce5ce00

        • C:\Users\Admin\AppData\Local\Temp\ServiceHub.IdentityHost.exe

          Filesize

          15KB

          MD5

          32fd126f7a21663d4da346ca41344322

          SHA1

          c98ec32a1f84de981df8395b14ab0259f5873bc5

          SHA256

          d6f408d5f43a72efb311fcf9a63d7dd5b597985b16a8048d78666d5ea2f59c39

          SHA512

          6487b9e1ec12072b467b6d61d41d87b652367dbf92b36442c2156d0101e1975ca3fe04a395128f3e4b70813024cf6b4a6793c03c65c813828fff5324260368b7

        • memory/2672-32-0x0000000074910000-0x00000000750C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2672-40-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/2672-38-0x0000000074910000-0x00000000750C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2672-33-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/2672-31-0x00000000002F0000-0x00000000002FA000-memory.dmp

          Filesize

          40KB

        • memory/3284-41-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/3284-39-0x0000000074910000-0x00000000750C0000-memory.dmp

          Filesize

          7.7MB

        • memory/3284-34-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/3284-30-0x0000000074910000-0x00000000750C0000-memory.dmp

          Filesize

          7.7MB

        • memory/3284-29-0x0000000000470000-0x000000000047A000-memory.dmp

          Filesize

          40KB

        • memory/3956-7-0x0000000004FD0000-0x0000000004FDA000-memory.dmp

          Filesize

          40KB

        • memory/3956-8-0x0000000005120000-0x0000000005130000-memory.dmp

          Filesize

          64KB

        • memory/3956-1-0x0000000074910000-0x00000000750C0000-memory.dmp

          Filesize

          7.7MB

        • memory/3956-35-0x0000000074910000-0x00000000750C0000-memory.dmp

          Filesize

          7.7MB

        • memory/3956-36-0x0000000005120000-0x0000000005130000-memory.dmp

          Filesize

          64KB

        • memory/3956-37-0x0000000005120000-0x0000000005130000-memory.dmp

          Filesize

          64KB

        • memory/3956-6-0x0000000005120000-0x0000000005130000-memory.dmp

          Filesize

          64KB

        • memory/3956-3-0x0000000004FE0000-0x0000000005072000-memory.dmp

          Filesize

          584KB

        • memory/3956-2-0x00000000054F0000-0x0000000005A94000-memory.dmp

          Filesize

          5.6MB

        • memory/3956-0-0x0000000000560000-0x0000000000578000-memory.dmp

          Filesize

          96KB