Resubmissions

16/05/2024, 17:46

240516-wcl8hsgd53 7

16/05/2024, 17:40

240516-v9a13sgc23 7

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 17:40

General

  • Target

    felipe.exe

  • Size

    152.7MB

  • MD5

    19ce72230b3b6bfd9d879d32bb392684

  • SHA1

    1ab8028bd918aefdc91570f933f93d5548324601

  • SHA256

    91eee2b2dea04bbc78c9bbccf05b3698e0a12f691cce42986e16db0ab10e853f

  • SHA512

    03da8b5fbef54f3b2aeeead91a0a0550e153b9e523835933a2ca9876f8000fba7f0cc5fc632ed83c4d4dc5a1c1d9443416eaeed5b478dbe862cf608cf074f284

  • SSDEEP

    1572864:KLBZB52nvuZ7wVuMbgR7Sp6kYdEctmhoLsPagBsgkx52HYhwj+vfIBUdoJnP9Dj0:KypCmJctBjj2+Jv

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\felipe.exe
    "C:\Users\Admin\AppData\Local\Temp\felipe.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:3104
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:2024
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1176
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4220
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1360
        • C:\Users\Admin\AppData\Local\Temp\felipe.exe
          "C:\Users\Admin\AppData\Local\Temp\felipe.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\felipe" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 --field-trial-handle=1840,i,4379811533151193888,5808423857109873334,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:4996
          • C:\Users\Admin\AppData\Local\Temp\felipe.exe
            "C:\Users\Admin\AppData\Local\Temp\felipe.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\felipe" --mojo-platform-channel-handle=2108 --field-trial-handle=1840,i,4379811533151193888,5808423857109873334,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:984
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3604
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:4592
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4408
              • C:\Windows\system32\where.exe
                where /r . *.sqlite
                3⤵
                  PID:776
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:5012
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  3⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2776
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2564
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  3⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1108
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4940
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  3⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1996
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"
                2⤵
                  PID:4184
                  • C:\Windows\system32\where.exe
                    where /r . cookies.sqlite
                    3⤵
                      PID:2496
                  • C:\Users\Admin\AppData\Local\Temp\felipe.exe
                    "C:\Users\Admin\AppData\Local\Temp\felipe.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\felipe" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2528 --field-trial-handle=1840,i,4379811533151193888,5808423857109873334,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3144

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  50c591ec2a1e49297738ea9f28e3ad23

                  SHA1

                  137e36b4c7c40900138a6bcf8cf5a3cce4d142af

                  SHA256

                  7648d785bda8cef95176c70711418cf3f18e065f7710f2ef467884b4887d8447

                  SHA512

                  33b5fa32501855c2617a822a4e1a2c9b71f2cf27e1b896cf6e5a28473cfd5e6d126840ca1aa1f59ef32b0d0a82a2a95c94a9cc8b845367b61e65ec70d456deec

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  2f87410b0d834a14ceff69e18946d066

                  SHA1

                  f2ec80550202d493db61806693439a57b76634f3

                  SHA256

                  5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                  SHA512

                  a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  64B

                  MD5

                  bec25a9af8d40895a4e1d3eba34414e8

                  SHA1

                  45fab29e59eec4e25655910056cf66ec349aed7d

                  SHA256

                  f40c625b2e491c825ba85e882d43889dedd673bfd016fbec610abdaf4fa4fdc2

                  SHA512

                  5f757e5f40805e8a3da8218ab8cb8f6826b6d3f351b941c031fc4f2171cd66fd69de8b7c9b468310dd930ff2dbe4d6b44d59ef1f4695c202df75ae3cbad911fa

                • C:\Users\Admin\AppData\Local\Temp\28587259-fdbf-44c8-9c4c-82593be7f6dd.tmp.node

                  Filesize

                  137KB

                  MD5

                  04bfbfec8db966420fe4c7b85ebb506a

                  SHA1

                  939bb742a354a92e1dcd3661a62d69e48030a335

                  SHA256

                  da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

                  SHA512

                  4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

                • C:\Users\Admin\AppData\Local\Temp\83c2cc6b-014b-45b0-becb-37738d0d3d9b.tmp.node

                  Filesize

                  1.8MB

                  MD5

                  66a65322c9d362a23cf3d3f7735d5430

                  SHA1

                  ed59f3e4b0b16b759b866ef7293d26a1512b952e

                  SHA256

                  f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                  SHA512

                  0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_c2nawok4.01f.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • memory/1176-41-0x000001B079350000-0x000001B0793C6000-memory.dmp

                  Filesize

                  472KB

                • memory/1176-45-0x000001B0792D0000-0x000001B0792F4000-memory.dmp

                  Filesize

                  144KB

                • memory/1176-44-0x000001B0792D0000-0x000001B0792FA000-memory.dmp

                  Filesize

                  168KB

                • memory/1176-40-0x000001B079280000-0x000001B0792C4000-memory.dmp

                  Filesize

                  272KB

                • memory/1176-21-0x000001B078E90000-0x000001B078EB2000-memory.dmp

                  Filesize

                  136KB

                • memory/3144-78-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-77-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-76-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-82-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-84-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-88-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-87-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-86-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-85-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3144-83-0x0000022E47FC0000-0x0000022E47FC1000-memory.dmp

                  Filesize

                  4KB