Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2024 04:03

General

  • Target

    AppDFSetup.exe

  • Size

    150.3MB

  • MD5

    0305c6040f60b15e78555fecdde6ddc0

  • SHA1

    07c58215f029201b49f6b34dc911a33904a5e9c1

  • SHA256

    74df5721e20c4ce87a8f7a3f512baa8c201bb095615a81c9581ee15cc50b1afb

  • SHA512

    78c18013c90a766226311163c38697f78335d15798289349612ec2fc503c538cc8fa96da65321ffc1ba0fcb94690d0fd0663fc20357a41aef20bc090ac1acaa3

  • SSDEEP

    1572864:DlAhthKM29V6LLWANUB9IinJn1cpGN4vM+JlhrZnQ9I4FdUrczKrk4Ze2OC2+:wtSD64Jnqrt5v2

Malware Config

Extracted

Family

stealc

C2

http://89.105.198.116

Attributes
  • url_path

    /192e1934359966f8.php

Signatures

  • Detects HijackLoader (aka IDAT Loader) 2 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Stealc

    Stealc is an infostealer written in C++.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1768,i,16743915325702977301,16861475606552588281,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:228
      • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --mojo-platform-channel-handle=2096 --field-trial-handle=1768,i,16743915325702977301,16861475606552588281,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:4496
        • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
          "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2440 --field-trial-handle=1768,i,16743915325702977301,16861475606552588281,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3320
          • C:\Users\Admin\AppData\Local\Temp\c87269f923a0b2731e0669ba9db53e0b.exe
            C:\Users\Admin\AppData\Local\Temp\c87269f923a0b2731e0669ba9db53e0b.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1144
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\SysWOW64\cmd.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:3576
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                5⤵
                  PID:2456
          • C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe
            "C:\Users\Admin\AppData\Local\Temp\AppDFSetup.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\AppDFSetup" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3668 --field-trial-handle=1768,i,16743915325702977301,16861475606552588281,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3340

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7220b4f9

          Filesize

          861KB

          MD5

          76b37c104e8d74da25672b7d4769e535

          SHA1

          9571345965b9a29c14727d4d7299de078219ecdf

          SHA256

          1a5eb8b8c583e03ce3f91be3859cc41d4f001a598f5bd4828bdf1df54db1aeec

          SHA512

          4ff48c53490c448cac4ee787984dd08faeda1d56a73d044acd924fcdd353315e3afe9aba9832e918ed9b2936eb1be88e8db028f4e597193f2c6d795ab8426cfd

        • C:\Users\Admin\AppData\Roaming\AppDFSetup\Network\Network Persistent State

          Filesize

          391B

          MD5

          bbe59a80323839cf3649b086bce642e7

          SHA1

          62748a5a4c041c6e308bcb291ec48ff534489ad4

          SHA256

          ce01a195fa6a53a9d0cb9cf8227efe777a1e6f34405df65038389920398c00ba

          SHA512

          5f0823a6ea4e5140a352cb5f88a7f92c2a8893cf98d23afd9a6a4d01b58c7586a1f31b32b5cd80c3e5d45c0b2b6772397230506271d408b0a233562834d30513

        • C:\Users\Admin\AppData\Roaming\AppDFSetup\Network\Network Persistent State~RFe58774e.TMP

          Filesize

          59B

          MD5

          2800881c775077e1c4b6e06bf4676de4

          SHA1

          2873631068c8b3b9495638c865915be822442c8b

          SHA256

          226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

          SHA512

          e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

        • C:\Users\Admin\AppData\Roaming\AppDFSetup\Network\TransportSecurity

          Filesize

          203B

          MD5

          b5882968c8d0dce60bd05c02b3d73add

          SHA1

          65b3ee2b53997dba3a5fc8342b153c48de058df7

          SHA256

          52b7d07be7256c6ff109769b0b399882dd22f33cc62c13ffedb502269b68a9e1

          SHA512

          2db772221eed8635aa4c10f82bb6738f6ee86fded3b78bdaef429a330f8ee2a4347d5e53acc97de50376b8d0c514075708966040a51ab089029dc6937f48357f

        • C:\Users\Admin\AppData\Roaming\AppDFSetup\Network\TransportSecurity~RFe5901ac.TMP

          Filesize

          203B

          MD5

          ac60f5ec88eb867b42146da9e2d8f707

          SHA1

          3f449015b49edfc1c5faca3a4074b4eaf2e697e4

          SHA256

          65da9209bf23c2b88a51d512232891ec28247d58b342673eb7c4daad4e6bef8c

          SHA512

          ee66f904b7789e7d91e2cba628dcf78417030d66efa9678c5a120532d253b12ce579d10160c0a9156926a996cf003c810981c142fbbd14e58fc8db6e485563d0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/228-2-0x00007FFF993D0000-0x00007FFF993D1000-memory.dmp

          Filesize

          4KB

        • memory/1144-89-0x0000000000400000-0x0000000000692000-memory.dmp

          Filesize

          2.6MB

        • memory/1144-92-0x0000000074650000-0x00000000747CB000-memory.dmp

          Filesize

          1.5MB

        • memory/1144-93-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

          Filesize

          2.0MB

        • memory/1144-91-0x0000000000400000-0x0000000000692000-memory.dmp

          Filesize

          2.6MB

        • memory/1144-109-0x0000000074650000-0x00000000747CB000-memory.dmp

          Filesize

          1.5MB

        • memory/2456-116-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

          Filesize

          2.0MB

        • memory/2456-115-0x0000000000520000-0x000000000075C000-memory.dmp

          Filesize

          2.2MB

        • memory/3340-95-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-105-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-104-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-103-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-102-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-101-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-106-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-100-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-96-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3340-94-0x0000014089430000-0x0000014089431000-memory.dmp

          Filesize

          4KB

        • memory/3576-112-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

          Filesize

          2.0MB

        • memory/3576-113-0x0000000074650000-0x00000000747CB000-memory.dmp

          Filesize

          1.5MB