Analysis

  • max time kernel
    135s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 08:06

General

  • Target

    tmp.exe

  • Size

    273KB

  • MD5

    e795115169cc800de0392d6a675d58fd

  • SHA1

    8dd75837e360ba1cb8acf5a3d348dd020a5da482

  • SHA256

    17f929c1d40a7fd6f897c0b15ca9c44b2059cbccb3037c31619d87954659478e

  • SHA512

    5fb6543e91de175bd365462a1cc87d6772e43b0effd3757b3e408b08a4de5a004de9a85e7f1d09578fa3bc6b6486c5f5016c1b879496582dbb39b2e62e168f38

  • SSDEEP

    6144:s/wl9dobdtMJNPX459l2/FpnovRWf1RdSxWbkHg6O0:HdoRtMJRkQp2MY0QO0

Score
10/10

Malware Config

Extracted

Family

xehook

C2

https://unotree.ru/

https://aiwhcpoaw.ru/

Signatures

  • Detect Xehook Payload 3 IoCs
  • Xehook stealer

    Xehook is an infostealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4348
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:640
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Start-Process 'C:\Users\Admin\AppData\Roaming\5LKPVA0FCY.exe'"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1168
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:3968

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xbqcc0bw.jla.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Roaming\5LKPVA0FCY.exe

          Filesize

          65KB

          MD5

          0257020bb01ed327be24c16765b961d2

          SHA1

          90a43c7e8dbfb75acd8ec3b60a73a422c222cd99

          SHA256

          78bef1cbf490744e853daa37b035cf556efb831a35fb0dcce046fee3e7852417

          SHA512

          c4bdd4619454a2eb8febb089516f56004619e48b39d021005f9d5bbb107b2ee6d8d165a823b8b17b35608bd1db7bff19db723d653649842a29f1969c5d4eb55e

        • memory/1168-36-0x0000000005F10000-0x0000000005F5C000-memory.dmp

          Filesize

          304KB

        • memory/1168-18-0x0000000074A60000-0x0000000075210000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-21-0x0000000002950000-0x0000000002960000-memory.dmp

          Filesize

          64KB

        • memory/1168-43-0x0000000002950000-0x0000000002960000-memory.dmp

          Filesize

          64KB

        • memory/1168-22-0x0000000005230000-0x0000000005858000-memory.dmp

          Filesize

          6.2MB

        • memory/1168-41-0x0000000002950000-0x0000000002960000-memory.dmp

          Filesize

          64KB

        • memory/1168-40-0x0000000006F10000-0x0000000006F32000-memory.dmp

          Filesize

          136KB

        • memory/1168-39-0x0000000006EC0000-0x0000000006EDA000-memory.dmp

          Filesize

          104KB

        • memory/1168-38-0x0000000006F60000-0x0000000006FF6000-memory.dmp

          Filesize

          600KB

        • memory/1168-30-0x00000000058D0000-0x0000000005C24000-memory.dmp

          Filesize

          3.3MB

        • memory/1168-19-0x0000000002950000-0x0000000002960000-memory.dmp

          Filesize

          64KB

        • memory/1168-20-0x0000000002960000-0x0000000002996000-memory.dmp

          Filesize

          216KB

        • memory/1168-46-0x0000000074A60000-0x0000000075210000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-37-0x0000000074A60000-0x0000000075210000-memory.dmp

          Filesize

          7.7MB

        • memory/1168-35-0x00000000051D0000-0x00000000051EE000-memory.dmp

          Filesize

          120KB

        • memory/1168-24-0x0000000005100000-0x0000000005166000-memory.dmp

          Filesize

          408KB

        • memory/1168-23-0x00000000050D0000-0x00000000050F2000-memory.dmp

          Filesize

          136KB

        • memory/2760-1-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2760-3-0x0000000074A50000-0x0000000075200000-memory.dmp

          Filesize

          7.7MB

        • memory/2760-15-0x0000000074A50000-0x0000000075200000-memory.dmp

          Filesize

          7.7MB

        • memory/2760-9-0x00000000066F0000-0x0000000006782000-memory.dmp

          Filesize

          584KB

        • memory/2760-8-0x0000000005200000-0x0000000005210000-memory.dmp

          Filesize

          64KB

        • memory/2760-7-0x0000000006110000-0x0000000006176000-memory.dmp

          Filesize

          408KB

        • memory/2760-6-0x0000000005200000-0x0000000005210000-memory.dmp

          Filesize

          64KB

        • memory/2760-5-0x0000000074A50000-0x0000000075200000-memory.dmp

          Filesize

          7.7MB

        • memory/2760-4-0x0000000005430000-0x00000000059D4000-memory.dmp

          Filesize

          5.6MB

        • memory/3544-2-0x0000000000CB0000-0x0000000000CF8000-memory.dmp

          Filesize

          288KB

        • memory/3544-0-0x0000000000CB0000-0x0000000000CF8000-memory.dmp

          Filesize

          288KB