Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 13:39
Behavioral task
behavioral1
Sample
ConsoleApplication2.exe
Resource
win10v2004-20240226-en
General
-
Target
ConsoleApplication2.exe
-
Size
4.4MB
-
MD5
72f73734bb6dbf6381815d85d680fb8e
-
SHA1
2a7c3855fc0e4a0813631946684a4173c425a266
-
SHA256
8045c954475f76556ef8c7b3305af51f5c7c8359a527404266c9e980527c4396
-
SHA512
96c3e0bef2224d5f5ebfe1d3880ecec1e120cfc56d6d978b91916332313e70c9167ed38204486640937912dff591e3e6faa72737e5e7a0441069087679e5b6f3
-
SSDEEP
49152:d9vRNVGsS21WaeQc+4Vg/95kVM04UwF7mwY/yg57/7AxcH7snP3kPOxrKPG+OzX2:d9vRNVVtpvagb0kqIcPM+H
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 51 discord.com 50 discord.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 ipinfo.io 56 ipinfo.io 37 ipinfo.io 38 ipinfo.io 43 ipinfo.io -
pid Process 3264 powershell.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2076 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2012 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 224 systeminfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3372 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4788 powershell.exe 4788 powershell.exe 4216 powershell.exe 4216 powershell.exe 4216 powershell.exe 3264 powershell.exe 3264 powershell.exe 3264 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4084 WMIC.exe Token: SeSecurityPrivilege 4084 WMIC.exe Token: SeTakeOwnershipPrivilege 4084 WMIC.exe Token: SeLoadDriverPrivilege 4084 WMIC.exe Token: SeSystemProfilePrivilege 4084 WMIC.exe Token: SeSystemtimePrivilege 4084 WMIC.exe Token: SeProfSingleProcessPrivilege 4084 WMIC.exe Token: SeIncBasePriorityPrivilege 4084 WMIC.exe Token: SeCreatePagefilePrivilege 4084 WMIC.exe Token: SeBackupPrivilege 4084 WMIC.exe Token: SeRestorePrivilege 4084 WMIC.exe Token: SeShutdownPrivilege 4084 WMIC.exe Token: SeDebugPrivilege 4084 WMIC.exe Token: SeSystemEnvironmentPrivilege 4084 WMIC.exe Token: SeRemoteShutdownPrivilege 4084 WMIC.exe Token: SeUndockPrivilege 4084 WMIC.exe Token: SeManageVolumePrivilege 4084 WMIC.exe Token: 33 4084 WMIC.exe Token: 34 4084 WMIC.exe Token: 35 4084 WMIC.exe Token: 36 4084 WMIC.exe Token: SeIncreaseQuotaPrivilege 4084 WMIC.exe Token: SeSecurityPrivilege 4084 WMIC.exe Token: SeTakeOwnershipPrivilege 4084 WMIC.exe Token: SeLoadDriverPrivilege 4084 WMIC.exe Token: SeSystemProfilePrivilege 4084 WMIC.exe Token: SeSystemtimePrivilege 4084 WMIC.exe Token: SeProfSingleProcessPrivilege 4084 WMIC.exe Token: SeIncBasePriorityPrivilege 4084 WMIC.exe Token: SeCreatePagefilePrivilege 4084 WMIC.exe Token: SeBackupPrivilege 4084 WMIC.exe Token: SeRestorePrivilege 4084 WMIC.exe Token: SeShutdownPrivilege 4084 WMIC.exe Token: SeDebugPrivilege 4084 WMIC.exe Token: SeSystemEnvironmentPrivilege 4084 WMIC.exe Token: SeRemoteShutdownPrivilege 4084 WMIC.exe Token: SeUndockPrivilege 4084 WMIC.exe Token: SeManageVolumePrivilege 4084 WMIC.exe Token: 33 4084 WMIC.exe Token: 34 4084 WMIC.exe Token: 35 4084 WMIC.exe Token: 36 4084 WMIC.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeIncreaseQuotaPrivilege 2076 WMIC.exe Token: SeSecurityPrivilege 2076 WMIC.exe Token: SeTakeOwnershipPrivilege 2076 WMIC.exe Token: SeLoadDriverPrivilege 2076 WMIC.exe Token: SeSystemProfilePrivilege 2076 WMIC.exe Token: SeSystemtimePrivilege 2076 WMIC.exe Token: SeProfSingleProcessPrivilege 2076 WMIC.exe Token: SeIncBasePriorityPrivilege 2076 WMIC.exe Token: SeCreatePagefilePrivilege 2076 WMIC.exe Token: SeBackupPrivilege 2076 WMIC.exe Token: SeRestorePrivilege 2076 WMIC.exe Token: SeShutdownPrivilege 2076 WMIC.exe Token: SeDebugPrivilege 2076 WMIC.exe Token: SeSystemEnvironmentPrivilege 2076 WMIC.exe Token: SeRemoteShutdownPrivilege 2076 WMIC.exe Token: SeUndockPrivilege 2076 WMIC.exe Token: SeManageVolumePrivilege 2076 WMIC.exe Token: 33 2076 WMIC.exe Token: 34 2076 WMIC.exe Token: 35 2076 WMIC.exe Token: 36 2076 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 1356 5076 ConsoleApplication2.exe 91 PID 5076 wrote to memory of 1356 5076 ConsoleApplication2.exe 91 PID 5076 wrote to memory of 1356 5076 ConsoleApplication2.exe 91 PID 1356 wrote to memory of 3372 1356 cmd.exe 92 PID 1356 wrote to memory of 3372 1356 cmd.exe 92 PID 1356 wrote to memory of 3372 1356 cmd.exe 92 PID 5076 wrote to memory of 1008 5076 ConsoleApplication2.exe 93 PID 5076 wrote to memory of 1008 5076 ConsoleApplication2.exe 93 PID 5076 wrote to memory of 1008 5076 ConsoleApplication2.exe 93 PID 1008 wrote to memory of 4084 1008 cmd.exe 94 PID 1008 wrote to memory of 4084 1008 cmd.exe 94 PID 1008 wrote to memory of 4084 1008 cmd.exe 94 PID 5076 wrote to memory of 4864 5076 ConsoleApplication2.exe 96 PID 5076 wrote to memory of 4864 5076 ConsoleApplication2.exe 96 PID 5076 wrote to memory of 4864 5076 ConsoleApplication2.exe 96 PID 4864 wrote to memory of 4788 4864 cmd.exe 97 PID 4864 wrote to memory of 4788 4864 cmd.exe 97 PID 4864 wrote to memory of 4788 4864 cmd.exe 97 PID 5076 wrote to memory of 1124 5076 ConsoleApplication2.exe 105 PID 5076 wrote to memory of 1124 5076 ConsoleApplication2.exe 105 PID 5076 wrote to memory of 1124 5076 ConsoleApplication2.exe 105 PID 1124 wrote to memory of 2076 1124 cmd.exe 106 PID 1124 wrote to memory of 2076 1124 cmd.exe 106 PID 1124 wrote to memory of 2076 1124 cmd.exe 106 PID 5076 wrote to memory of 1768 5076 ConsoleApplication2.exe 107 PID 5076 wrote to memory of 1768 5076 ConsoleApplication2.exe 107 PID 5076 wrote to memory of 1768 5076 ConsoleApplication2.exe 107 PID 1768 wrote to memory of 3076 1768 cmd.exe 108 PID 1768 wrote to memory of 3076 1768 cmd.exe 108 PID 1768 wrote to memory of 3076 1768 cmd.exe 108 PID 5076 wrote to memory of 2660 5076 ConsoleApplication2.exe 109 PID 5076 wrote to memory of 2660 5076 ConsoleApplication2.exe 109 PID 5076 wrote to memory of 2660 5076 ConsoleApplication2.exe 109 PID 2660 wrote to memory of 4752 2660 cmd.exe 110 PID 2660 wrote to memory of 4752 2660 cmd.exe 110 PID 2660 wrote to memory of 4752 2660 cmd.exe 110 PID 5076 wrote to memory of 952 5076 ConsoleApplication2.exe 111 PID 5076 wrote to memory of 952 5076 ConsoleApplication2.exe 111 PID 5076 wrote to memory of 952 5076 ConsoleApplication2.exe 111 PID 952 wrote to memory of 3064 952 cmd.exe 112 PID 952 wrote to memory of 3064 952 cmd.exe 112 PID 952 wrote to memory of 3064 952 cmd.exe 112 PID 5076 wrote to memory of 4440 5076 ConsoleApplication2.exe 113 PID 5076 wrote to memory of 4440 5076 ConsoleApplication2.exe 113 PID 5076 wrote to memory of 4440 5076 ConsoleApplication2.exe 113 PID 4440 wrote to memory of 4216 4440 cmd.exe 114 PID 4440 wrote to memory of 4216 4440 cmd.exe 114 PID 4440 wrote to memory of 4216 4440 cmd.exe 114 PID 5076 wrote to memory of 3580 5076 ConsoleApplication2.exe 115 PID 5076 wrote to memory of 3580 5076 ConsoleApplication2.exe 115 PID 5076 wrote to memory of 3580 5076 ConsoleApplication2.exe 115 PID 3580 wrote to memory of 2012 3580 cmd.exe 116 PID 3580 wrote to memory of 2012 3580 cmd.exe 116 PID 3580 wrote to memory of 2012 3580 cmd.exe 116 PID 5076 wrote to memory of 3440 5076 ConsoleApplication2.exe 117 PID 5076 wrote to memory of 3440 5076 ConsoleApplication2.exe 117 PID 5076 wrote to memory of 3440 5076 ConsoleApplication2.exe 117 PID 3440 wrote to memory of 224 3440 cmd.exe 118 PID 3440 wrote to memory of 224 3440 cmd.exe 118 PID 3440 wrote to memory of 224 3440 cmd.exe 118 PID 5076 wrote to memory of 1668 5076 ConsoleApplication2.exe 122 PID 5076 wrote to memory of 1668 5076 ConsoleApplication2.exe 122 PID 5076 wrote to memory of 1668 5076 ConsoleApplication2.exe 122 PID 1668 wrote to memory of 552 1668 cmd.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\ConsoleApplication2.exe"C:\Users\Admin\AppData\Local\Temp\ConsoleApplication2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 1 1.1.1.12⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\PING.EXEping -n 1 1.1.1.13⤵
- Runs ping.exe
PID:3372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic csproduct get uuid2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell Get-ItemPropertyValue -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault2⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic path win32_VideoController get name2⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic cpu get name2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:3076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get Caption /value2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get Caption /value3⤵PID:4752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic path win32_VideoController get currentrefreshrate2⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get currentrefreshrate3⤵PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell Get-Content (Get-PSReadlineOption).HistorySavePath2⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-Content (Get-PSReadlineOption).HistorySavePath3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c tasklist2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh wlan show profile2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get /value2⤵PID:3392
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get /value3⤵PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe -Command "Get-ItemProperty HKLM:\\Software\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate, InstallLocation"2⤵PID:1124
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-ItemProperty HKLM:\\Software\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate, InstallLocation"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get Caption /value2⤵PID:984
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get Caption /value3⤵PID:3776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic csproduct get uuid2⤵PID:832
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get Caption /value2⤵PID:2228
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get Caption /value3⤵PID:4376
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
18KB
MD5376a29e9545dfe09d988d14374ccf899
SHA161ff8905a29cce1c97652fd3f81db8662e20de0a
SHA25641bce43c07952d9b920ba1646193c69eca454f20724bb69f118a271bb856cdf3
SHA512e563f063f6e2df293ea6768d9fc6cde170dda65ccfb9df4598c2c09b00a19a0f3e7770af8cdd90338d6a169553006a1b929173c214ccefe8ba14c03f3b693643
-
Filesize
20KB
MD58c71d523605846544fa995d46ab0ff8b
SHA1140ef9e3a21b28b128de6a29f2710bd31e20459f
SHA2564b0b955009f1afcb4af5c8d141dfccb8bc298c837201a9902f5e9255d1329e57
SHA5123bcfc06ec08590877a391130a5741ee3fd524e4c4b6133d35cb6f9fb41b7415eaa641626a4f3d68e14f62ead98125044c070774e23455b0217e6dc5b2219c7e9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
194KB
MD5366b68313aa9534997a271a9d2e2c260
SHA18ba37a9064967babe7df301ae423f49f84e4d816
SHA256a933ec16ad23a8a0863e545795dd38a7206f89d5a177954b0b8fd3ebf5315c9a
SHA512b936d8bc6fc869365902ae35cac31897d82f59d396f85776278dfa3266bb236e172bb4666493d0dd6b0abdb8afd12fa6451125f1c36386f20a4ba6318fabedfe