Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 11:53

General

  • Target

    feather.exe

  • Size

    164.7MB

  • MD5

    a3397ce6bac790f14ca2aea580b93b0a

  • SHA1

    cd632ac684d5fc87009c261313015ba31a5a7f16

  • SHA256

    eee88f50670a3491925a51e8f8765edc339ec025488a083245759d0181969c7c

  • SHA512

    ea74218fd6fa5c832cbeb1e99e562996f16e11f3b8b1adbb7714a21988312a26d3c02d581375bc904f7d808decc9413c48ceba156e3b51817aad67c2e83e6995

  • SSDEEP

    1572864:a3lB0RhDP7igv6wO+HkaN/xtpj56BZWua2T3jC0gqhd07YeRt6C1Bd1jKoUeKtQk:vPvt1x2z5m1ij

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\feather.exe
    "C:\Users\Admin\AppData\Local\Temp\feather.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=3116 get ExecutablePath"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic process where processid=3116 get ExecutablePath
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4068
    • C:\Users\Admin\AppData\Local\Temp\feather.exe
      "C:\Users\Admin\AppData\Local\Temp\feather.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\obligasteis" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1924 --field-trial-handle=1928,i,14647510844237259637,14962809822596915437,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:4464
      • C:\Users\Admin\AppData\Local\Temp\feather.exe
        "C:\Users\Admin\AppData\Local\Temp\feather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\obligasteis" --mojo-platform-channel-handle=2108 --field-trial-handle=1928,i,14647510844237259637,14962809822596915437,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:1704
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "net session"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Windows\system32\net.exe
            net session
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4976
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 session
              4⤵
                PID:1168
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2948
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic csproduct get uuid
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2740
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption, osarchitecture | more +1"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4576
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic OS get caption, osarchitecture
              3⤵
                PID:3176
              • C:\Windows\system32\more.com
                more +1
                3⤵
                  PID:4396
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name | more +1"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2384
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic cpu get name
                  3⤵
                    PID:1008
                  • C:\Windows\system32\more.com
                    more +1
                    3⤵
                      PID:2716
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController get name | more +1"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2132
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic PATH Win32_VideoController get name
                      3⤵
                      • Detects videocard installed
                      PID:3380
                    • C:\Windows\system32\more.com
                      more +1
                      3⤵
                        PID:4544
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                      2⤵
                        PID:2300
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4268
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion' -Name ProductName"
                        2⤵
                          PID:3992
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion' -Name ProductName
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1964
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=3116 get ExecutablePath"
                          2⤵
                            PID:3648
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic process where processid=3116 get ExecutablePath
                              3⤵
                                PID:4880
                            • C:\Users\Admin\AppData\Local\Temp\feather.exe
                              "C:\Users\Admin\AppData\Local\Temp\feather.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\obligasteis" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3024 --field-trial-handle=1928,i,14647510844237259637,14962809822596915437,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                              2⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4232

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            6cf293cb4d80be23433eecf74ddb5503

                            SHA1

                            24fe4752df102c2ef492954d6b046cb5512ad408

                            SHA256

                            b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                            SHA512

                            0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            64B

                            MD5

                            0ff7e1af4cc86e108eef582452b35523

                            SHA1

                            c2ccf2811d56c3a3a58dced2b07f95076c6b5b96

                            SHA256

                            62ed8ef2250f9f744852cb67df0286c80f94e26aed646989b76e5b78f2f1f0d0

                            SHA512

                            374675fd36cd8bc38acaec44d4cc855b85feece548d99616496d498e61e943fd695fec7c57550a58a32455e8b21b41bafa18cd1dadac69676fff1de1a56da937

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g0yv0vod.ayp.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\ce6c653e-4a71-4cae-ab88-ddb11eaaf484.tmp.node

                            Filesize

                            125KB

                            MD5

                            ba973fe2fa62e2bfa81c30cb0d77b2c2

                            SHA1

                            69fed56755ea90b354ae637e88b04f9568c2a8cb

                            SHA256

                            9e39235c5b07ca875e8e139ca6b29fc97205875df5c009c3854f64a5cdeef778

                            SHA512

                            867067ae3b58d10a914aefb8b9a3f9550b20f724ad6f5011d391f83f153fb9f3418ef27bc78008146b9b04657e72ebd827799fa3aff247a61b5986e83593c0cf

                          • C:\Users\Admin\AppData\Local\Temp\d5522cbc-8734-47ca-953e-7a40ab97b906.tmp.node

                            Filesize

                            153KB

                            MD5

                            efe1f662b2b23a094b20f0a951c14b10

                            SHA1

                            9f239fbdb6ec000710bf33923d29eddf65b357c7

                            SHA256

                            04e3334cd62fc251145ac09a052b6a069634740c4b61825cce0f14a588542ec6

                            SHA512

                            50c13ee918422fdc2e6e53e67f51a4b8eb22c84dda54f5afdcadd96e9ecf000097c6beb0778511a2e5ee93130694c4a66bc8a73db614c8b6faa1a70243e9ab07

                          • C:\Users\Admin\AppData\Local\Temp\e7a1abdc-1768-4da4-b795-1739b6c49365.tmp.node

                            Filesize

                            1.4MB

                            MD5

                            56192831a7f808874207ba593f464415

                            SHA1

                            e0c18c72a62692d856da1f8988b0bc9c8088d2aa

                            SHA256

                            6aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c

                            SHA512

                            c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                            Filesize

                            2B

                            MD5

                            f3b25701fe362ec84616a93a45ce9998

                            SHA1

                            d62636d8caec13f04e28442a0a6fa1afeb024bbb

                            SHA256

                            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                            SHA512

                            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                          • memory/4232-97-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-99-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-98-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-104-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-109-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-108-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-107-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-106-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-105-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4232-103-0x000001B7EC920000-0x000001B7EC921000-memory.dmp

                            Filesize

                            4KB

                          • memory/4268-21-0x0000012DE7570000-0x0000012DE7592000-memory.dmp

                            Filesize

                            136KB