Analysis

  • max time kernel
    98s
  • max time network
    103s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-05-2024 00:04

General

  • Target

    encryp.exe

  • Size

    152.7MB

  • MD5

    25f888fc79242c7eace67573b878f0f9

  • SHA1

    d528dfd86871e14eab58b45406d38e1570470d46

  • SHA256

    67efa8c6754b1d546c71a7ddb19d00814662c45425ead7dbf148870cbd982340

  • SHA512

    ccb6cc285b13b885010e0d4c3eff8f50d9b3bce08d07d0a326051f84d8e131989631712219988bb5f4caf2072e3abdeca527a27742195bcd48b137f94e0e1278

  • SSDEEP

    1572864:KLBZB52nvuZ7wVuMbgR7Sp6kYdEctmhoLsPagBsgkx52HYhwj+vfIBUdoJnP9Dj0:KypCmJctBjj2+Jv

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\encryp.exe
    "C:\Users\Admin\AppData\Local\Temp\encryp.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:1964
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:4352
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2208
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4684
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1184
        • C:\Users\Admin\AppData\Local\Temp\encryp.exe
          "C:\Users\Admin\AppData\Local\Temp\encryp.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\encryp" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 --field-trial-handle=1868,i,3693738769573500263,10473315392397578850,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:3160
          • C:\Users\Admin\AppData\Local\Temp\encryp.exe
            "C:\Users\Admin\AppData\Local\Temp\encryp.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\encryp" --mojo-platform-channel-handle=2060 --field-trial-handle=1868,i,3693738769573500263,10473315392397578850,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1636
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1552
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:1172
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4268
              • C:\Windows\system32\where.exe
                where /r . *.sqlite
                3⤵
                  PID:5116
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2248
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  3⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2952
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4732
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  3⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1628
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1916
                • C:\Windows\system32\where.exe
                  where /r . cookies.sqlite
                  3⤵
                    PID:1108
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                  2⤵
                    PID:3604
                    • C:\Windows\system32\tasklist.exe
                      tasklist
                      3⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4188

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  918925b4ffb522c4188485a5e84ab6ed

                  SHA1

                  f53ee7bacfae671d898075778f668cbf727c5d5e

                  SHA256

                  18d5722b4bdd546da121b4c8756096755cab8cb7c40126d93644910d9292f343

                  SHA512

                  82d4b87cc804c393a5c812a4dc327743ae928a44f8fd52902410ba43dfae738254e94437b0482c86a93dea416fcb87a34ed892f8541c7508545b3c98dfd4d8ea

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  1KB

                  MD5

                  0254494a4c89bf8f623066957ccb7ea1

                  SHA1

                  0a31bf0f80c2e5caaf36fdf4266b72379cfb3751

                  SHA256

                  ffda9233d24b63e14924cddc16d3885111c7cf09abe840547c0a266c2000687f

                  SHA512

                  8f8c04122ae09f4a544d482eb72c30fc6d1ae9840e4247eb9e7a5cbe6e912fbff9132afc78974509923c24c30a8049199d43d83aba49b8a66ab78316546673bb

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bd3qfi4x.k0l.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\de7ece07-e3b0-4a4e-ad60-e68c7fe9422c.tmp.node

                  Filesize

                  137KB

                  MD5

                  04bfbfec8db966420fe4c7b85ebb506a

                  SHA1

                  939bb742a354a92e1dcd3661a62d69e48030a335

                  SHA256

                  da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

                  SHA512

                  4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

                • C:\Users\Admin\AppData\Local\Temp\eb05d19e-7a4b-4f1a-b693-602e74a1bc1b.tmp.node

                  Filesize

                  1.8MB

                  MD5

                  66a65322c9d362a23cf3d3f7735d5430

                  SHA1

                  ed59f3e4b0b16b759b866ef7293d26a1512b952e

                  SHA256

                  f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                  SHA512

                  0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                • memory/4684-20-0x00000257C9420000-0x00000257C9442000-memory.dmp

                  Filesize

                  136KB

                • memory/4684-37-0x00000257C9820000-0x00000257C9866000-memory.dmp

                  Filesize

                  280KB

                • memory/4684-41-0x00000257C9870000-0x00000257C9894000-memory.dmp

                  Filesize

                  144KB

                • memory/4684-40-0x00000257C9870000-0x00000257C989A000-memory.dmp

                  Filesize

                  168KB