Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/04/2024, 23:39

General

  • Target

    SeanPalia.exe

  • Size

    131.9MB

  • MD5

    b0a0c7118089066877d370ab5a103236

  • SHA1

    3cd7dc4c3d1664aa58dbf4126e0500296076e884

  • SHA256

    e80ccaeed92ccdf0314baed3bee369ccd8901ba3fa76eeeb23cba1e02d1a3a95

  • SHA512

    bd1f7b80f755ed3b57fbf29ed788c3a5e351cfd97550c1502c6f85bfa0ec2ab325abde9ed4be8c0c7a3d85d2b7017f63e74526c0f8f0c34397a9bf8ec4c9fc0f

  • SSDEEP

    1572864:84sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVB:hl/BkVVPBDgmPKa5Wnu3X7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe
    "C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4960
      • C:\Windows\SysWOW64\chcp.com
        chcp
        3⤵
          PID:3936
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:1296
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4304
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4428
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5072
        • C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe
          "C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\SeanPalia" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1852,i,8806923863563297060,11380844331168046893,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:4956
          • C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe
            "C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\SeanPalia" --mojo-platform-channel-handle=2124 --field-trial-handle=1852,i,8806923863563297060,11380844331168046893,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1468
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1900
            • C:\Windows\SysWOW64\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:2180
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4248
              • C:\Windows\SysWOW64\where.exe
                where /r . *.sqlite
                3⤵
                  PID:484
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                2⤵
                  PID:4408
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    3⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2736
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                  2⤵
                    PID:3864
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      3⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:720
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"
                    2⤵
                      PID:1608
                      • C:\Windows\SysWOW64\where.exe
                        where /r . cookies.sqlite
                        3⤵
                          PID:4840
                      • C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe
                        "C:\Users\Admin\AppData\Local\Temp\SeanPalia.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\SeanPalia" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1852,i,8806923863563297060,11380844331168046893,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4832

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      5d6f598a3db684622a53f373fdb04625

                      SHA1

                      2214fd2ce8edfed9a4503acf5ac413d13ade357b

                      SHA256

                      54e79fa820aac7e651a13303018ca63af8699392c1dabad85a4ff636d696bdc8

                      SHA512

                      7a9744c2b6322e8d2b8146dd521868d55ac323b9b2a94f8e0b964980c2c1607eebc752f29d218a02001accaedf74f92bd4c61464059b574da2ce565fa8870645

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      20KB

                      MD5

                      039eb5695370bdad04c03428e73e15d6

                      SHA1

                      143da5c2970e2a035e0508b99e9bf74b2918c1ef

                      SHA256

                      c85836aac6c4611403596edb3d9cfee018cdd3840acbd2090c41c2aa8f05df78

                      SHA512

                      29430e087d22b0f426b631d35513711a6470254963a0b718a6c45e91d2c0d82ff53b72deccbeb2d7832ab141534bee55443ecbe1777dbb6afc8e1c4c428b84e8

                    • C:\Users\Admin\AppData\Local\Temp\75ced7e1-28d7-4be0-b358-304052e82ee7.tmp.node

                      Filesize

                      95KB

                      MD5

                      6c1d7f92dec057060697206b3b14b015

                      SHA1

                      ad7ecfacdc16ccb39e8395fba84fa7a8f8816a38

                      SHA256

                      b50a237d11f5d15d462163d8aca0d69828504cb3edaf2d64fe988386fb7747a0

                      SHA512

                      c1ec826356e87c4b979e473df07bd7e2797eabc830bf230697574d8f07c6480c1743af6977538240130217532d42b302ed4b92a9eb58c80333c37d51b6b050aa

                    • C:\Users\Admin\AppData\Local\Temp\90ae509e-9164-4cd5-9246-70e86237d153.tmp.node

                      Filesize

                      1.5MB

                      MD5

                      d276a36ffcf8e7b996e72d8f09205a1b

                      SHA1

                      397f111253ed76fa6913f69c37402f915de20b45

                      SHA256

                      41518b51c339368458c700569578b652198b845ba98e9a78270026b5307f139c

                      SHA512

                      11bfe509a48e480008697c6843b28cb3e055cca9f79208ca8a384b4849b39e08f1f4236ec89112830d3056c6eca3553f55c165a6a4696c1af7283ea9684e57c1

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xi1t4yhl.5tb.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • memory/4304-61-0x000000006CBF0000-0x000000006CC3C000-memory.dmp

                      Filesize

                      304KB

                    • memory/4304-78-0x000000006CE20000-0x000000006D177000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/4428-75-0x0000000007D90000-0x0000000007DB4000-memory.dmp

                      Filesize

                      144KB

                    • memory/4428-74-0x0000000007D60000-0x0000000007D8A000-memory.dmp

                      Filesize

                      168KB

                    • memory/4428-41-0x0000000006730000-0x000000000674E000-memory.dmp

                      Filesize

                      120KB

                    • memory/4428-42-0x0000000006760000-0x00000000067AC000-memory.dmp

                      Filesize

                      304KB

                    • memory/4428-43-0x0000000007760000-0x00000000077A6000-memory.dmp

                      Filesize

                      280KB

                    • memory/4428-50-0x000000006CBF0000-0x000000006CC3C000-memory.dmp

                      Filesize

                      304KB

                    • memory/4428-11-0x0000000003250000-0x0000000003286000-memory.dmp

                      Filesize

                      216KB

                    • memory/4428-59-0x0000000007B70000-0x0000000007B8E000-memory.dmp

                      Filesize

                      120KB

                    • memory/4428-48-0x0000000007B10000-0x0000000007B44000-memory.dmp

                      Filesize

                      208KB

                    • memory/4428-14-0x0000000005B00000-0x0000000005B66000-memory.dmp

                      Filesize

                      408KB

                    • memory/4428-60-0x0000000007B90000-0x0000000007C34000-memory.dmp

                      Filesize

                      656KB

                    • memory/4428-77-0x000000006CE20000-0x000000006D177000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/4428-72-0x0000000007D20000-0x0000000007D2A000-memory.dmp

                      Filesize

                      40KB

                    • memory/4428-15-0x0000000005B70000-0x0000000005BD6000-memory.dmp

                      Filesize

                      408KB

                    • memory/4832-107-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-108-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-110-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-109-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-106-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-105-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-98-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-104-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-99-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/4832-100-0x000000000E390000-0x000000000E391000-memory.dmp

                      Filesize

                      4KB

                    • memory/5072-71-0x0000000007E10000-0x0000000007EA2000-memory.dmp

                      Filesize

                      584KB

                    • memory/5072-70-0x0000000008990000-0x0000000008F36000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/5072-49-0x0000000007CB0000-0x0000000007CCA000-memory.dmp

                      Filesize

                      104KB

                    • memory/5072-12-0x0000000005D30000-0x000000000635A000-memory.dmp

                      Filesize

                      6.2MB

                    • memory/5072-47-0x0000000008310000-0x000000000898A000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/5072-13-0x0000000005AB0000-0x0000000005AD2000-memory.dmp

                      Filesize

                      136KB

                    • memory/5072-16-0x00000000064B0000-0x0000000006807000-memory.dmp

                      Filesize

                      3.3MB