Resubmissions

13/06/2024, 17:13

240613-vrddgsxckh 7

13/06/2024, 16:28

240613-tynx5aweka 7

Analysis

  • max time kernel
    125s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 17:13

General

  • Target

    ShaderifyBeta 1.4.0.exe

  • Size

    53.4MB

  • MD5

    4200f0d5579cdf7a6e27f1fff4b661e0

  • SHA1

    7e5ebd65720889e39eb0df2e1e062b4cc5f17aab

  • SHA256

    de10aa6f3cf0d066b00b9331b98de872704acb3f5bc29c19002b3aacc392a29a

  • SHA512

    45c5152b5f314525cebd0b294463ed470164e1f6b524824775b472c797ee5927bcc1f8a161c9c6a495a7fb136a963eb3f209e134331419edeae160226a517587

  • SSDEEP

    786432:DOHETki1abUblkiPKt3Ul7eeHwQXG01UsMhb0lRJR/vACVs8F5hlbprQTC:U1r2nKt3E7XwuGcdM1+zHOEDrQTC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 19 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ShaderifyBeta 1.4.0.exe
    "C:\Users\Admin\AppData\Local\Temp\ShaderifyBeta 1.4.0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe
      C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\system32\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1664
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,11,41,104,198,207,96,183,75,148,34,156,136,41,68,251,129,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,139,191,200,204,232,11,253,45,200,97,8,125,179,118,164,91,26,103,109,96,228,81,45,0,207,246,17,66,181,225,82,84,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,168,83,102,22,27,219,202,37,74,174,22,108,14,168,219,207,182,212,190,245,151,7,177,177,106,167,172,16,68,24,200,79,48,0,0,0,77,241,164,235,224,108,216,110,202,129,142,148,153,118,99,214,90,189,161,136,130,243,73,204,253,248,139,186,247,237,77,245,227,236,30,208,92,154,49,128,235,194,243,104,173,205,91,223,64,0,0,0,116,114,102,111,46,132,128,85,236,214,163,252,172,133,87,84,93,92,29,119,168,0,240,203,197,220,41,15,3,111,115,2,65,225,200,31,91,64,183,107,195,12,245,12,226,65,201,248,154,203,17,77,26,147,245,153,183,186,179,182,100,129,160,169), $null, 'CurrentUser')"
        3⤵
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,11,41,104,198,207,96,183,75,148,34,156,136,41,68,251,129,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,139,191,200,204,232,11,253,45,200,97,8,125,179,118,164,91,26,103,109,96,228,81,45,0,207,246,17,66,181,225,82,84,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,168,83,102,22,27,219,202,37,74,174,22,108,14,168,219,207,182,212,190,245,151,7,177,177,106,167,172,16,68,24,200,79,48,0,0,0,77,241,164,235,224,108,216,110,202,129,142,148,153,118,99,214,90,189,161,136,130,243,73,204,253,248,139,186,247,237,77,245,227,236,30,208,92,154,49,128,235,194,243,104,173,205,91,223,64,0,0,0,116,114,102,111,46,132,128,85,236,214,163,252,172,133,87,84,93,92,29,119,168,0,240,203,197,220,41,15,3,111,115,2,65,225,200,31,91,64,183,107,195,12,245,12,226,65,201,248,154,203,17,77,26,147,245,153,183,186,179,182,100,129,160,169), $null, 'CurrentUser')
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2400
      • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe
        "C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe" --type=gpu-process --field-trial-handle=1192,1025921910701306226,7850490599875946460,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1200 /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:344
      • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe
        "C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1192,1025921910701306226,7850490599875946460,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1576 /prefetch:8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:700
      • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe
        "C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ShaderifyBeta.exe" --type=gpu-process --field-trial-handle=1192,1025921910701306226,7850490599875946460,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1396 /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\chrome_100_percent.pak

    Filesize

    121KB

    MD5

    06baf0ad34e0231bd76651203dba8326

    SHA1

    a5f99ecdcc06dec9d7f9ce0a8c66e46969117391

    SHA256

    5ae14147992a92548bcad76867dd88cdfcdb69d951c8720920cce6fb135e3189

    SHA512

    aff6616e56781ebb925a0ca146245ad3b2827250b32261c0c7c0d5b10b20a343a17fc3761c95d93104163e77b2eae3f1f9cbd3cb2b377f49b42bea39bdd09b91

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\chrome_200_percent.pak

    Filesize

    181KB

    MD5

    57c27201e7cd33471da7ec205fe9973c

    SHA1

    a8e7bce09c4cbdae2797611b2be8aeb5491036f9

    SHA256

    dd8146b2ee289e4d54a4a0f1fd3b2f61b979c6a2baaba96a406d96c3f4fdb33b

    SHA512

    57258aa169bec66abf0f45a3e026bb68751fb970b74bd0cb465607fa3b2a89967e832d92d8f675f0449bb6662fcb7786d05f0597124cc8e18bb99a47245779b4

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\ffmpeg.dll

    Filesize

    2.7MB

    MD5

    eabfc10d56cb44a86493cb2f8ca7aab2

    SHA1

    09d7e87f43527333cd021329d6c2f4e8bd8ddab5

    SHA256

    42a2a996ac433ac33a22776b8418a82753557093d90147b7951138b5c83924b6

    SHA512

    ee31e3539fba9e5969a9f38c428f586de2dd7630cb5d8c5e3c2c934b5881f8176b8ab6ef6397c1ce4fa6ccf3ee9615225c7afa0e0b28c6fc23974e8b96625dec

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\icudtl.dat

    Filesize

    10.0MB

    MD5

    ad2988770b8cb3281a28783ad833a201

    SHA1

    94b7586ee187d9b58405485f4c551b55615f11b5

    SHA256

    df876c7af43ed93eec6aea4d2d55c805009c219653cdeb368f1d048f4922b108

    SHA512

    f27e542a9c6c60fa28c5b7cc2818079341ef93aef3bbcadecad2dc11aff5b1592b19c7ebfa543ea42a3cbfec26a668641b255545fb0912056e25e852c2dedd01

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\libglesv2.dll

    Filesize

    7.3MB

    MD5

    bc45db0195aa369cc3c572e4e9eefc7e

    SHA1

    b880ca4933656be52f027028af5ef8a3b7e07e97

    SHA256

    a81729fd6ee2d64dfc47501a1d53794cdeee5c1daa3751f7554aea2503686d10

    SHA512

    dd8c39947e7d767fbdccf90c5b3eaedf3937b43c55200d2199107333b63ac09e5356c286618874fac841e1357dd927e0c70b5066c1feeedd8cc6c0fba605ee5f

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\locales\en-US.pak

    Filesize

    83KB

    MD5

    bd8f7b719110342b7cefb16ddd05ec55

    SHA1

    82a79aeaa1dd4b1464b67053ba1766a4498c13e7

    SHA256

    d1d3f892be16329c79f9a8ee8c5fa1c9fb46d17edfeb56a3d9407f9d7587a0de

    SHA512

    7cd1493e59e87c70927e66769eb200f79a57e1eb1223af4eb4064088571893d3e32cbc4b5ece568fd308992aad65684aa280dc9834f2b5d327bdee514b046e5e

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\resources.pak

    Filesize

    4.8MB

    MD5

    d13873f6fb051266deb3599b14535806

    SHA1

    143782c0ce5a5773ae0aae7a22377c8a6d18a5b2

    SHA256

    7b953443e3cd54a0a4775528b52fbfe5ebecbc2c71731600ed0999d227969506

    SHA512

    1ab38fcb70d1958c74da2493459532b52a04b884009509a1ac8dd39f6e9e670658a52f4d19ef57f1bc71dccfdd6ceedbc18034bbcad0b500d75a97c74aac6939

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\resources\app.asar

    Filesize

    12.2MB

    MD5

    29ddab4b09b22a2816dddee0ef0a9cc1

    SHA1

    9a991af3c46caadf9e87e1a4d8333e30d44e2863

    SHA256

    09cfc49b70f45487d424e70b1fb8006a2fb58c57c92035325fd0a7c024151514

    SHA512

    3eacc19833f56ed98c2f5d40463365f707adbf9ecb0c6c8b62c4c79b7d786ba9187b0e4633443d3facaa0fb48624a5d8f0d06cd9034b6dd96ebbc1281734163b

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\swiftshader\libegl.dll

    Filesize

    460KB

    MD5

    acd46d81bb4f34912c255a8d01953635

    SHA1

    25969cc9e588e174b854566778f283f067c3c0c6

    SHA256

    bd1bc00a5c29726fb39645041fc6c8295256d90c7f739ebeaa8b6c382a4db189

    SHA512

    83692654ada422391b428953b2cec67048a171bbef4c59158f34607a762feac8a233b52ceaa528306cf103d9830ee38897afa996389e086d3778f290555a059b

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\swiftshader\libglesv2.dll

    Filesize

    3.1MB

    MD5

    8090f82a02c6850cc7bd2b481a7533e0

    SHA1

    54a0b66d76c1b60e45e83ba4627299d0b2aae84a

    SHA256

    e9473ba82f6d8742ab74e67484886291aa69037db72e0ae256b19581de0b772e

    SHA512

    b2e3c57926860a7954ca6e426f5f2fa080cf6ccb5c4edd77f59744f240f597aa9613f46294e8b344db76b46fe78777b5016828b8ab2fc274ca107f3af7abd878

  • C:\Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\v8_context_snapshot.bin

    Filesize

    168KB

    MD5

    c2208c06c8ff81bca3c092cc42b8df1b

    SHA1

    f7b9faa9ba0e72d062f68642a02cc8f3fed49910

    SHA256

    4a67de195878d290f49b503b83e415917b8bbcbd9936b07a5d33b48e9bc6e0a3

    SHA512

    6c3c370dd086a976c44d4059a315bd3bcbb50961aa34734e65a40d861cffca9090d47cec74575afe23952e394e4845bda2d8798eebe01fb54a7a6288bce238f5

  • \Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\d3dcompiler_47.dll

    Filesize

    4.3MB

    MD5

    7641e39b7da4077084d2afe7c31032e0

    SHA1

    2256644f69435ff2fee76deb04d918083960d1eb

    SHA256

    44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47

    SHA512

    8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

  • \Users\Admin\AppData\Local\Temp\2hpwXEE2AzZivyWGESsni02xD9J\libEGL.dll

    Filesize

    438KB

    MD5

    660a9ae1282e6205fc0a51e64470eb5b

    SHA1

    f91a9c9559f51a8f33a552f0145ed9e706909de8

    SHA256

    f2a841b6ef320f226965c7cb01fbc4709fc31425e490a3edfa20147ce3656c85

    SHA512

    20bed2bed042033e3d8b077f9d66bce67922aaec180cc3777f20560219226b7efc73932bb87445afda4e3877472ddcd307215d23954cd082051437e5f2224263

  • \Users\Admin\AppData\Local\Temp\bebfc752-3038-4929-8714-9cf0abe57042.tmp.node

    Filesize

    1.4MB

    MD5

    56192831a7f808874207ba593f464415

    SHA1

    e0c18c72a62692d856da1f8988b0bc9c8088d2aa

    SHA256

    6aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c

    SHA512

    c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33

  • \Users\Admin\AppData\Local\Temp\nso170B.tmp\StdUtils.dll

    Filesize

    101KB

    MD5

    33b4e69e7835e18b9437623367dd1787

    SHA1

    53afa03edaf931abdc2d828e5a2c89ad573d926c

    SHA256

    72d38ef115e71fc73dc5978987c583fc8c6b50ff12e4a5d30649a4d164a8b6ae

    SHA512

    ca890e785d1a0a7e0b4a748416fba417826ae66b46e600f407d4e795b444612a8b830f579f2cf5b6e051bea800604f34f8801cc3daf05c8d29ad05bcda454a77

  • \Users\Admin\AppData\Local\Temp\nso170B.tmp\System.dll

    Filesize

    11KB

    MD5

    75ed96254fbf894e42058062b4b4f0d1

    SHA1

    996503f1383b49021eb3427bc28d13b5bbd11977

    SHA256

    a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

    SHA512

    58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

  • \Users\Admin\AppData\Local\Temp\nso170B.tmp\nsis7z.dll

    Filesize

    391KB

    MD5

    c6a070b3e68b292bb0efc9b26e85e9cc

    SHA1

    5a922b96eda6595a68fd0a9051236162ff2e2ada

    SHA256

    66ac8bd1f273a73e17a3f31d6add739d3cb0330a6417faeda11a9cae00b62d8b

    SHA512

    8eff8fc16f5bb574bd9483e3b217b67a8986e31497368c06fdaa3a1e93a40aee94a5b31729d01905157b0ae1e556a402f43cd29a4d30a0587e1ec334458a44e8

  • memory/344-195-0x0000000000060000-0x0000000000061000-memory.dmp

    Filesize

    4KB

  • memory/344-228-0x0000000077C50000-0x0000000077C51000-memory.dmp

    Filesize

    4KB

  • memory/2400-182-0x0000000002810000-0x0000000002818000-memory.dmp

    Filesize

    32KB

  • memory/2400-181-0x000000001B500000-0x000000001B7E2000-memory.dmp

    Filesize

    2.9MB