Analysis

  • max time kernel
    18s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 04:03

General

  • Target

    AppDFSetup.exe

  • Size

    150.3MB

  • MD5

    0305c6040f60b15e78555fecdde6ddc0

  • SHA1

    07c58215f029201b49f6b34dc911a33904a5e9c1

  • SHA256

    74df5721e20c4ce87a8f7a3f512baa8c201bb095615a81c9581ee15cc50b1afb

  • SHA512

    78c18013c90a766226311163c38697f78335d15798289349612ec2fc503c538cc8fa96da65321ffc1ba0fcb94690d0fd0663fc20357a41aef20bc090ac1acaa3

  • SSDEEP

    1572864:DlAhthKM29V6LLWANUB9IinJn1cpGN4vM+JlhrZnQ9I4FdUrczKrk4Ze2OC2+:wtSD64Jnqrt5v2

Malware Config

Extracted

Family

stealc

C2

http://89.105.198.116

Attributes
  • url_path

    /192e1934359966f8.php

Signatures

  • Detects HijackLoader (aka IDAT Loader) 2 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Stealc

    Stealc is an infostealer written in C++.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1040 --field-trial-handle=1136,i,7658109765399159326,1574129412022958160,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:2584
      • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --mojo-platform-channel-handle=1308 --field-trial-handle=1136,i,7658109765399159326,1574129412022958160,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:2712
        • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
          "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1444 --field-trial-handle=1136,i,7658109765399159326,1574129412022958160,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          PID:2624
          • C:\Users\Admin\AppData\Local\Temp\7b5e70ce48860f5ec5da918cd5c971e5.exe
            C:\Users\Admin\AppData\Local\Temp\7b5e70ce48860f5ec5da918cd5c971e5.exe
            3⤵
              PID:2472
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\SysWOW64\cmd.exe
                4⤵
                  PID:2460
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    5⤵
                      PID:2756
              • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
                "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1176 --field-trial-handle=1136,i,7658109765399159326,1574129412022958160,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                2⤵
                  PID:332

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Defense Evasion

              Subvert Trust Controls

              1
              T1553

              Install Root Certificate

              1
              T1553.004

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\b1e3122e
                Filesize

                861KB

                MD5

                27b51e5c52e8c62edd489c0f087ac941

                SHA1

                20a4c011d6fea4270efd4cc75eb30493be97abac

                SHA256

                434fee8c941f54542ea9142582a948209b2ec7b0bb419871dcb9fdcb4fe739a6

                SHA512

                bc77daf7589d4e2bf8f2af80c317cfa4693cb62b2f3a9adc60696f9df900a9ae50734293955173fd18a2537ba537ac4cb1b8dfc6093b5f00788f6be1a913d67b

              • C:\Users\Admin\AppData\Roaming\AppDFSetup\DawnCache\data_0
                Filesize

                8KB

                MD5

                cf89d16bb9107c631daabf0c0ee58efb

                SHA1

                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                SHA256

                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                SHA512

                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

              • C:\Users\Admin\AppData\Roaming\AppDFSetup\DawnCache\data_2
                Filesize

                8KB

                MD5

                0962291d6d367570bee5454721c17e11

                SHA1

                59d10a893ef321a706a9255176761366115bedcb

                SHA256

                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                SHA512

                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

              • C:\Users\Admin\AppData\Roaming\AppDFSetup\DawnCache\data_3
                Filesize

                8KB

                MD5

                41876349cb12d6db992f1309f22df3f0

                SHA1

                5cf26b3420fc0302cd0a71e8d029739b8765be27

                SHA256

                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                SHA512

                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

              • C:\Users\Admin\AppData\Roaming\AppDFSetup\GPUCache\data_1
                Filesize

                264KB

                MD5

                f50f89a0a91564d0b8a211f8921aa7de

                SHA1

                112403a17dd69d5b9018b8cede023cb3b54eab7d

                SHA256

                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                SHA512

                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

              • C:\Users\Admin\AppData\Roaming\AppDFSetup\Local Storage\leveldb\CURRENT~RFf7637a4.TMP
                Filesize

                16B

                MD5

                46295cac801e5d4857d09837238a6394

                SHA1

                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                SHA256

                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                SHA512

                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

              • memory/2460-180-0x0000000076DE0000-0x0000000076F89000-memory.dmp
                Filesize

                1.7MB

              • memory/2460-181-0x0000000074180000-0x00000000742F4000-memory.dmp
                Filesize

                1.5MB

              • memory/2472-172-0x0000000000400000-0x0000000000692000-memory.dmp
                Filesize

                2.6MB

              • memory/2472-173-0x0000000000400000-0x0000000000692000-memory.dmp
                Filesize

                2.6MB

              • memory/2472-175-0x0000000074180000-0x00000000742F4000-memory.dmp
                Filesize

                1.5MB

              • memory/2472-176-0x0000000076DE0000-0x0000000076F89000-memory.dmp
                Filesize

                1.7MB

              • memory/2472-177-0x0000000074180000-0x00000000742F4000-memory.dmp
                Filesize

                1.5MB

              • memory/2584-1-0x0000000000060000-0x0000000000061000-memory.dmp
                Filesize

                4KB

              • memory/2584-31-0x0000000076F90000-0x0000000076F91000-memory.dmp
                Filesize

                4KB

              • memory/2756-183-0x0000000000400000-0x000000000063C000-memory.dmp
                Filesize

                2.2MB