Analysis

  • max time kernel
    93s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 07:11

General

  • Target

    ShadowFury.exe

  • Size

    131.9MB

  • MD5

    40c4cd50211b681dd8fb792e61c1528a

  • SHA1

    d9a5697c55de20ece15e8123a97f9987ed519d5c

  • SHA256

    bb0410610f2b6148f5a2d7995059264aca1f92cbc7f636acef259cad6162679b

  • SHA512

    6e9cd99fee28a0543ab09c993942ef1498f1ab46cd056b178fc4bd903b5faeda1bc96a3e1a93658794e5851c8b60c3c89ab54a424ca8ffaba03cf40cd4bda9e7

  • SSDEEP

    1572864:O4sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVG:nl/BkVVPBDgmPKa5Wnu3X7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe
    "C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\Windows\SysWOW64\chcp.com
        chcp
        3⤵
          PID:3912
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:1528
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2724
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4452
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
        • C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe
          "C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ShadowFury" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 --field-trial-handle=1912,i,12562713642983351035,14949666281809302048,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:1368
          • C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe
            "C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ShadowFury" --mojo-platform-channel-handle=2140 --field-trial-handle=1912,i,12562713642983351035,14949666281809302048,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1156
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4384
            • C:\Windows\SysWOW64\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:2216
            • C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe
              "C:\Users\Admin\AppData\Local\Temp\ShadowFury.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\ShadowFury" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 --field-trial-handle=1912,i,12562713642983351035,14949666281809302048,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
              2⤵
                PID:3028

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              4279e6347a341c54e5e9bcc5ccf0b55e

              SHA1

              54e8b5376f11426145c70cb07a47da6c7c536bfe

              SHA256

              1d6fb68d1b317f18ae1f506adebddc735260a7d79fc25cbe5208a66baf9611fb

              SHA512

              ebfa6e9a7ae45305d929c0ec75fcf2d368fa786427e533859b537b4c1a3d609f9eff313977e6c3a33acf4d06906149fdc8f3bf684d36be9c5f669867e6b722c5

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              21KB

              MD5

              504b556f4fb35cf9f461c5cf25eda40b

              SHA1

              ad2f78db635c6689d078db3cff0efde5617de11a

              SHA256

              3451f4be4471c85532c1927d58bb0873ea7aabaa26424479a1add92c3268822f

              SHA512

              e3c394e1534691b77af334a3f03641bf23c1e8d9d4951000ba22591a69d4ea4bf7edd9505eed9799892b6004d6c506550b096581519ba2d0824c987d683431f2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              21KB

              MD5

              f151198f9160d72846eb1d784adf3ca6

              SHA1

              8a6444605208c99dfb8c8c9a6cccbd39ece17d7e

              SHA256

              d042e00673082901a4ea74e367ce380a5f5bb75e40f220e360b5c904a22074a0

              SHA512

              a015fb56cc040902c8cad698de92a287298cd2ecf75080a708718c26857e6b8b074a0e6f014f70ba827c769176c4375f668b085b185029a01eb39539deb543f2

            • C:\Users\Admin\AppData\Local\Temp\8ab4664f-c947-41bc-9b6d-0072c044c6c8.tmp.node

              Filesize

              1.5MB

              MD5

              38b06a59c62c0ae0697ca7ca9d038faa

              SHA1

              5b0f8b212d3810e5a11ef3c8db5cb608fe09f037

              SHA256

              da32eed100db13a4604149f70e3d04190183a83ef0737cec69e2a9bfb6108e4d

              SHA512

              8dd4bd26ac711925ac7be8ed6aa8cd8da5e503cc10d7f8a8dd78a9655420f511215a925ba902370c9b5be0515ce38c68a5650de0136279fefbb12080cedb273e

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fb4sdddr.coe.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\ffbf4c61-c8e4-47e7-890b-6637ec7d18da.tmp.node

              Filesize

              95KB

              MD5

              c5cb988e34da7d6aaba113c2565224bd

              SHA1

              fc15f35453a6b483c20402bd7ca0040eb0096d0b

              SHA256

              c376f270e702f71bac0bcc4982031e99379728f748468c9b09c0c1b31d93fa08

              SHA512

              fed34cf2ddbb50319520067e0a960619d1b2a3db29d4d47484ed271b3eddc1f98aad292a3ffc67ac6b94118bcc0d0944e23f37799ca9aec3f852983a5c596cb1

            • memory/2576-23-0x0000000004690000-0x00000000046A0000-memory.dmp

              Filesize

              64KB

            • memory/2576-53-0x0000000005A90000-0x0000000005AAE000-memory.dmp

              Filesize

              120KB

            • memory/2576-66-0x0000000007030000-0x00000000070C2000-memory.dmp

              Filesize

              584KB

            • memory/2576-92-0x0000000072B20000-0x00000000732D0000-memory.dmp

              Filesize

              7.7MB

            • memory/2576-22-0x0000000005410000-0x0000000005476000-memory.dmp

              Filesize

              408KB

            • memory/2576-10-0x00000000044F0000-0x0000000004526000-memory.dmp

              Filesize

              216KB

            • memory/2576-24-0x0000000004690000-0x00000000046A0000-memory.dmp

              Filesize

              64KB

            • memory/2576-12-0x0000000072B20000-0x00000000732D0000-memory.dmp

              Filesize

              7.7MB

            • memory/2576-63-0x00000000080E0000-0x0000000008684000-memory.dmp

              Filesize

              5.6MB

            • memory/2576-30-0x0000000005480000-0x00000000057D4000-memory.dmp

              Filesize

              3.3MB

            • memory/2576-55-0x0000000005F70000-0x0000000005FB4000-memory.dmp

              Filesize

              272KB

            • memory/2724-97-0x000000006CBE0000-0x000000006CF34000-memory.dmp

              Filesize

              3.3MB

            • memory/2724-100-0x0000000004D90000-0x0000000004DA0000-memory.dmp

              Filesize

              64KB

            • memory/2724-95-0x0000000007950000-0x000000000797A000-memory.dmp

              Filesize

              168KB

            • memory/2724-20-0x0000000004D90000-0x0000000004DA0000-memory.dmp

              Filesize

              64KB

            • memory/2724-56-0x0000000007530000-0x00000000075A6000-memory.dmp

              Filesize

              472KB

            • memory/2724-57-0x0000000007C30000-0x00000000082AA000-memory.dmp

              Filesize

              6.5MB

            • memory/2724-58-0x00000000075D0000-0x00000000075EA000-memory.dmp

              Filesize

              104KB

            • memory/2724-14-0x0000000072B20000-0x00000000732D0000-memory.dmp

              Filesize

              7.7MB

            • memory/2724-19-0x0000000004D90000-0x0000000004DA0000-memory.dmp

              Filesize

              64KB

            • memory/2724-90-0x0000000004D90000-0x0000000004DA0000-memory.dmp

              Filesize

              64KB

            • memory/2724-68-0x000000007F830000-0x000000007F840000-memory.dmp

              Filesize

              64KB

            • memory/2724-67-0x000000006C450000-0x000000006C49C000-memory.dmp

              Filesize

              304KB

            • memory/2724-108-0x0000000072B20000-0x00000000732D0000-memory.dmp

              Filesize

              7.7MB

            • memory/3028-120-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-113-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-125-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-124-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-123-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-122-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-119-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-121-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-115-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/3028-114-0x000000000E870000-0x000000000E871000-memory.dmp

              Filesize

              4KB

            • memory/4452-96-0x00000000072C0000-0x00000000072E4000-memory.dmp

              Filesize

              144KB

            • memory/4452-17-0x0000000004AB0000-0x0000000004AD2000-memory.dmp

              Filesize

              136KB

            • memory/4452-13-0x0000000004D00000-0x0000000005328000-memory.dmp

              Filesize

              6.2MB

            • memory/4452-15-0x0000000072B20000-0x00000000732D0000-memory.dmp

              Filesize

              7.7MB

            • memory/4452-106-0x0000000072B20000-0x00000000732D0000-memory.dmp

              Filesize

              7.7MB

            • memory/4452-21-0x00000000054A0000-0x0000000005506000-memory.dmp

              Filesize

              408KB

            • memory/4452-18-0x00000000046C0000-0x00000000046D0000-memory.dmp

              Filesize

              64KB

            • memory/4452-99-0x00000000046C0000-0x00000000046D0000-memory.dmp

              Filesize

              64KB

            • memory/4452-98-0x000000006CBE0000-0x000000006CF34000-memory.dmp

              Filesize

              3.3MB

            • memory/4452-79-0x0000000007150000-0x00000000071F3000-memory.dmp

              Filesize

              652KB

            • memory/4452-78-0x0000000007130000-0x000000000714E000-memory.dmp

              Filesize

              120KB

            • memory/4452-62-0x00000000070F0000-0x0000000007122000-memory.dmp

              Filesize

              200KB

            • memory/4452-54-0x0000000005BC0000-0x0000000005C0C000-memory.dmp

              Filesize

              304KB

            • memory/4452-93-0x0000000007250000-0x000000000725A000-memory.dmp

              Filesize

              40KB

            • memory/4452-64-0x000000007F650000-0x000000007F660000-memory.dmp

              Filesize

              64KB

            • memory/4452-65-0x000000006C450000-0x000000006C49C000-memory.dmp

              Filesize

              304KB

            • memory/4452-16-0x00000000046C0000-0x00000000046D0000-memory.dmp

              Filesize

              64KB