Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/04/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
SeanPalia.rar
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
SeanPalia.exe
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app-32.7z
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
SeanPalia.exe
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
resources/elevate.exe
Resource
win11-20240419-en
General
-
Target
SeanPalia.exe
-
Size
131.9MB
-
MD5
b0a0c7118089066877d370ab5a103236
-
SHA1
3cd7dc4c3d1664aa58dbf4126e0500296076e884
-
SHA256
e80ccaeed92ccdf0314baed3bee369ccd8901ba3fa76eeeb23cba1e02d1a3a95
-
SHA512
bd1f7b80f755ed3b57fbf29ed788c3a5e351cfd97550c1502c6f85bfa0ec2ab325abde9ed4be8c0c7a3d85d2b7017f63e74526c0f8f0c34397a9bf8ec4c9fc0f
-
SSDEEP
1572864:84sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVB:hl/BkVVPBDgmPKa5Wnu3X7
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4752 SeanPalia.exe 4752 SeanPalia.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ipinfo.io 2 ipinfo.io -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SeanPalia.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SeanPalia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz SeanPalia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SeanPalia.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SeanPalia.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SeanPalia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SeanPalia.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 720 tasklist.exe 2736 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1468 SeanPalia.exe 1468 SeanPalia.exe 4304 powershell.exe 5072 powershell.exe 4428 powershell.exe 4428 powershell.exe 5072 powershell.exe 4304 powershell.exe 4832 SeanPalia.exe 4832 SeanPalia.exe 4832 SeanPalia.exe 4832 SeanPalia.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeDebugPrivilege 4304 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeIncreaseQuotaPrivilege 4428 powershell.exe Token: SeSecurityPrivilege 4428 powershell.exe Token: SeTakeOwnershipPrivilege 4428 powershell.exe Token: SeLoadDriverPrivilege 4428 powershell.exe Token: SeSystemProfilePrivilege 4428 powershell.exe Token: SeSystemtimePrivilege 4428 powershell.exe Token: SeProfSingleProcessPrivilege 4428 powershell.exe Token: SeIncBasePriorityPrivilege 4428 powershell.exe Token: SeCreatePagefilePrivilege 4428 powershell.exe Token: SeBackupPrivilege 4428 powershell.exe Token: SeRestorePrivilege 4428 powershell.exe Token: SeShutdownPrivilege 4428 powershell.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeSystemEnvironmentPrivilege 4428 powershell.exe Token: SeRemoteShutdownPrivilege 4428 powershell.exe Token: SeUndockPrivilege 4428 powershell.exe Token: SeManageVolumePrivilege 4428 powershell.exe Token: 33 4428 powershell.exe Token: 34 4428 powershell.exe Token: 35 4428 powershell.exe Token: 36 4428 powershell.exe Token: SeIncreaseQuotaPrivilege 4304 powershell.exe Token: SeSecurityPrivilege 4304 powershell.exe Token: SeTakeOwnershipPrivilege 4304 powershell.exe Token: SeLoadDriverPrivilege 4304 powershell.exe Token: SeSystemProfilePrivilege 4304 powershell.exe Token: SeSystemtimePrivilege 4304 powershell.exe Token: SeProfSingleProcessPrivilege 4304 powershell.exe Token: SeIncBasePriorityPrivilege 4304 powershell.exe Token: SeCreatePagefilePrivilege 4304 powershell.exe Token: SeBackupPrivilege 4304 powershell.exe Token: SeRestorePrivilege 4304 powershell.exe Token: SeShutdownPrivilege 4304 powershell.exe Token: SeDebugPrivilege 4304 powershell.exe Token: SeSystemEnvironmentPrivilege 4304 powershell.exe Token: SeRemoteShutdownPrivilege 4304 powershell.exe Token: SeUndockPrivilege 4304 powershell.exe Token: SeManageVolumePrivilege 4304 powershell.exe Token: 33 4304 powershell.exe Token: 34 4304 powershell.exe Token: 35 4304 powershell.exe Token: 36 4304 powershell.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeDebugPrivilege 2736 tasklist.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeDebugPrivilege 720 tasklist.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe Token: SeCreatePagefilePrivilege 4752 SeanPalia.exe Token: SeShutdownPrivilege 4752 SeanPalia.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4960 4752 SeanPalia.exe 78 PID 4752 wrote to memory of 4960 4752 SeanPalia.exe 78 PID 4752 wrote to memory of 4960 4752 SeanPalia.exe 78 PID 4960 wrote to memory of 3936 4960 cmd.exe 80 PID 4960 wrote to memory of 3936 4960 cmd.exe 80 PID 4960 wrote to memory of 3936 4960 cmd.exe 80 PID 4752 wrote to memory of 1296 4752 SeanPalia.exe 81 PID 4752 wrote to memory of 1296 4752 SeanPalia.exe 81 PID 4752 wrote to memory of 1296 4752 SeanPalia.exe 81 PID 4752 wrote to memory of 4304 4752 SeanPalia.exe 83 PID 4752 wrote to memory of 4304 4752 SeanPalia.exe 83 PID 4752 wrote to memory of 4304 4752 SeanPalia.exe 83 PID 4752 wrote to memory of 4428 4752 SeanPalia.exe 84 PID 4752 wrote to memory of 4428 4752 SeanPalia.exe 84 PID 4752 wrote to memory of 4428 4752 SeanPalia.exe 84 PID 4752 wrote to memory of 5072 4752 SeanPalia.exe 85 PID 4752 wrote to memory of 5072 4752 SeanPalia.exe 85 PID 4752 wrote to memory of 5072 4752 SeanPalia.exe 85 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 4956 4752 SeanPalia.exe 89 PID 4752 wrote to memory of 1468 4752 SeanPalia.exe 90 PID 4752 wrote to memory of 1468 4752 SeanPalia.exe 90 PID 4752 wrote to memory of 1468 4752 SeanPalia.exe 90 PID 4752 wrote to memory of 1900 4752 SeanPalia.exe 92 PID 4752 wrote to memory of 1900 4752 SeanPalia.exe 92 PID 4752 wrote to memory of 1900 4752 SeanPalia.exe 92 PID 1900 wrote to memory of 2180 1900 cmd.exe 94 PID 1900 wrote to memory of 2180 1900 cmd.exe 94 PID 1900 wrote to memory of 2180 1900 cmd.exe 94 PID 4752 wrote to memory of 4248 4752 SeanPalia.exe 95 PID 4752 wrote to memory of 4248 4752 SeanPalia.exe 95 PID 4752 wrote to memory of 4248 4752 SeanPalia.exe 95 PID 4248 wrote to memory of 484 4248 cmd.exe 97 PID 4248 wrote to memory of 484 4248 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe"C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\chcp.comchcp3⤵PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"2⤵PID:1296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe"C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\SeanPalia" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1852,i,8806923863563297060,11380844331168046893,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe"C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\SeanPalia" --mojo-platform-channel-handle=2124 --field-trial-handle=1852,i,8806923863563297060,11380844331168046893,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\findstr.exefindstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"3⤵PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"2⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\where.exewhere /r . *.sqlite3⤵PID:484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:4408
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:3864
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"2⤵PID:1608
-
C:\Windows\SysWOW64\where.exewhere /r . cookies.sqlite3⤵PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe"C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\SeanPalia" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1852,i,8806923863563297060,11380844331168046893,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD55d6f598a3db684622a53f373fdb04625
SHA12214fd2ce8edfed9a4503acf5ac413d13ade357b
SHA25654e79fa820aac7e651a13303018ca63af8699392c1dabad85a4ff636d696bdc8
SHA5127a9744c2b6322e8d2b8146dd521868d55ac323b9b2a94f8e0b964980c2c1607eebc752f29d218a02001accaedf74f92bd4c61464059b574da2ce565fa8870645
-
Filesize
20KB
MD5039eb5695370bdad04c03428e73e15d6
SHA1143da5c2970e2a035e0508b99e9bf74b2918c1ef
SHA256c85836aac6c4611403596edb3d9cfee018cdd3840acbd2090c41c2aa8f05df78
SHA51229430e087d22b0f426b631d35513711a6470254963a0b718a6c45e91d2c0d82ff53b72deccbeb2d7832ab141534bee55443ecbe1777dbb6afc8e1c4c428b84e8
-
Filesize
95KB
MD56c1d7f92dec057060697206b3b14b015
SHA1ad7ecfacdc16ccb39e8395fba84fa7a8f8816a38
SHA256b50a237d11f5d15d462163d8aca0d69828504cb3edaf2d64fe988386fb7747a0
SHA512c1ec826356e87c4b979e473df07bd7e2797eabc830bf230697574d8f07c6480c1743af6977538240130217532d42b302ed4b92a9eb58c80333c37d51b6b050aa
-
Filesize
1.5MB
MD5d276a36ffcf8e7b996e72d8f09205a1b
SHA1397f111253ed76fa6913f69c37402f915de20b45
SHA25641518b51c339368458c700569578b652198b845ba98e9a78270026b5307f139c
SHA51211bfe509a48e480008697c6843b28cb3e055cca9f79208ca8a384b4849b39e08f1f4236ec89112830d3056c6eca3553f55c165a6a4696c1af7283ea9684e57c1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82