Analysis

  • max time kernel
    97s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 12:59

General

  • Target

    https://github.com/Princekin/malware-database/tree/main/Socelars%20Trojan

Malware Config

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 53 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://github.com/Princekin/malware-database/tree/main/Socelars%20Trojan"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://github.com/Princekin/malware-database/tree/main/Socelars%20Trojan
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4520.0.2025305779\1906376982" -parentBuildID 20230214051806 -prefsHandle 1752 -prefMapHandle 1744 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd4779e4-2ec1-4aa5-b67f-a6b205db1c4e} 4520 "\\.\pipe\gecko-crash-server-pipe.4520" 1832 1d4d630d758 gpu
        3⤵
          PID:3536
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4520.1.1291549295\1102641413" -parentBuildID 20230214051806 -prefsHandle 2484 -prefMapHandle 2464 -prefsLen 22927 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b126b7c2-414a-4853-b0b9-964d0c6bb1d3} 4520 "\\.\pipe\gecko-crash-server-pipe.4520" 2496 1d4c9587558 socket
          3⤵
          • Checks processor information in registry
          PID:1972
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4520.2.1828412640\486414997" -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3144 -prefsLen 23030 -prefMapSize 235121 -jsInitHandle 1276 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69684e8d-3fd4-4593-9857-58ac527eeb10} 4520 "\\.\pipe\gecko-crash-server-pipe.4520" 3272 1d4d873ab58 tab
          3⤵
            PID:4208
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4520.3.884280941\1823044830" -childID 2 -isForBrowser -prefsHandle 3620 -prefMapHandle 3616 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1276 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0caaf00e-241a-470a-bb5a-f7d28348139f} 4520 "\\.\pipe\gecko-crash-server-pipe.4520" 3648 1d4db00aa58 tab
            3⤵
              PID:4880
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4520.4.1180749700\1122405292" -childID 3 -isForBrowser -prefsHandle 5140 -prefMapHandle 5132 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1276 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43493ee8-8ee0-481a-a3a3-5036f528296b} 4520 "\\.\pipe\gecko-crash-server-pipe.4520" 5152 1d4dd288a58 tab
              3⤵
                PID:3736
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4520.5.1156776467\387179659" -childID 4 -isForBrowser -prefsHandle 5380 -prefMapHandle 5376 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1276 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2204dbd-7d7e-446e-a72b-be5c4b3d7844} 4520 "\\.\pipe\gecko-crash-server-pipe.4520" 5296 1d4dd288458 tab
                3⤵
                  PID:3560
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4520.6.1194468647\114513489" -childID 5 -isForBrowser -prefsHandle 5460 -prefMapHandle 5176 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1276 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd986a46-3622-454a-902f-fd595ff7d5e9} 4520 "\\.\pipe\gecko-crash-server-pipe.4520" 5280 1d4dd28ae58 tab
                  3⤵
                    PID:4936
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:1444
                • C:\Program Files\7-Zip\7zFM.exe
                  "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Socelars - 24.09.2022.zip"
                  1⤵
                  • NTFS ADS
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:1392
                  • C:\Users\Admin\AppData\Local\Temp\7zO07590AF7\Install.exe
                    "C:\Users\Admin\AppData\Local\Temp\7zO07590AF7\Install.exe"
                    2⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:3828
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                  1⤵
                    PID:3912
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                    1⤵
                      PID:2920
                    • C:\Windows\system32\taskmgr.exe
                      "C:\Windows\system32\taskmgr.exe" /4
                      1⤵
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:1812

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\rfj66zji.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      28KB

                      MD5

                      e857ff2760b93d5ae6de664cb0ca9bd9

                      SHA1

                      1027e5604bfc57e44494ff588c1fc20130f66b6b

                      SHA256

                      a02941ce3c6cbe9ae8232fdf0e3a6bffbb7bd9b138086ba1a9e26ea803f7b84a

                      SHA512

                      dbd38568079d389a852cee78c65e853b3822c1bde9831fa1d3dadd19ace2e981343238f7ff203f934732e731699319980f817882ddb7cb62450b88b7a8098d62

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\rfj66zji.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      29KB

                      MD5

                      dabeb22830f4500a3bd5840e36409874

                      SHA1

                      c046b6b32710b36400a4acd3e8097197a198c7b9

                      SHA256

                      3e7a727e2908cf3d236c5fe3176f7c3113bf574e11ebcfea8fb3c5289174fbb8

                      SHA512

                      ec75258e14eb7a4a9ab92b7ac8842088dddffef987b7b0cff138489f3d6ebc2a9a12272ed1bf3cb5dec3e7ca4494fe79d49b588de6f97686694757454034bcae

                    • C:\Users\Admin\AppData\Local\Temp\7zO07590AF7\Install.exe

                      Filesize

                      5.4MB

                      MD5

                      3c23db5eff4d85d8ff9addb170e32d53

                      SHA1

                      1f109f5b9b17a71e4ef7e200fccab72b21836017

                      SHA256

                      c2c694174fbf54aa19e05636589ac4eaf81d6b342c96be869bf57da18b930d98

                      SHA512

                      ad428facaddaba14acc1979ad6d93c4f665f58b4c9d14b28f2c0c1818290abe9dbbbd4e1c464bd8d38caebb101d6e4e85cf85fdaf423a0f3f5d0d134d8953f69

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      23cc4cb49ffbc0c4a178a3a9c0297055

                      SHA1

                      77e67bf1bc7d53e3545ad49ff408076598b9fc85

                      SHA256

                      3728f705bcf60c12862f589394f8ab9c8d2618dcf1b67279d0ea5b849f6ca0ab

                      SHA512

                      99a78b4cb7f693a68664f6b4c00d62e9654910d64699e8c229e143d387249d74716a49e0b353931614cc35ab655a156e163abe6aadfac4a449c2c1189cc919e8

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      21dc1fa456096519a91a7911cc0b0ca8

                      SHA1

                      e3a476bcd40835d83d8dc9f3dcf37e1ba3bac977

                      SHA256

                      9fe8595f63909001b0751ce6d1ede492a34689862371e2a227230cfdc8f8dc52

                      SHA512

                      a31965a42445e10ce41e88c59ee692c481231190f62a730cfedab1f2918b9923a2f05d29f08a0c9fa31a8e19e750c99ecfc86949c46dc11e91fb9ca27d6d1902

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\prefs.js

                      Filesize

                      7KB

                      MD5

                      9e11ab3012f93b551b573ffb36ff1174

                      SHA1

                      24d79c577a5baaefe32cda1c23bd7f595f007dab

                      SHA256

                      ef7ac20bed252c1872669b10c17cdabe0666abc816ecc5c89218d226e088504f

                      SHA512

                      23898c68672d9daf4c50ccf55d057ab5c037e9b429d001a20cfad7033dc68611ebc8f22006ebec4be7edb486eb4fffa290c1907bd6c6d841d617928302f85190

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      2ea074432f3a6f2c9971debc46d97604

                      SHA1

                      ac0173c78df1db34b0c6c0188c07ab92a6eaf1a5

                      SHA256

                      3c09056ce14a481656ce8abab73f4fbbdcbabe3d86347ea47004423465c9c1ff

                      SHA512

                      32e5b80e03e30e2e2b6d8e830f16c06c65093a9d815180256c44d36613abad45a7edbb6855c055edd21c5622151534e094966d6ac658be00680ed4f92fd3ad6d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      35bfbb776ccde5143c8e89c27d718f0a

                      SHA1

                      df9f01fae3c2ceee19dfdccdabc4b0674d95206e

                      SHA256

                      108cbc28bf3d54ad41cda4855981d8e3c9d6eed13b1e16dbf3fbf166a9ceeba6

                      SHA512

                      721bd86c3106918813ac35ca4c94daeac00d51732871f22e8aea576affdf8adba12321adc34ce7c247ca9a21a503d500205c7bbf21420c0a83fcef632b38c6cf

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      3KB

                      MD5

                      8b16906443448f4666370160f7f8ba01

                      SHA1

                      271119bc009413a56844b20637338ad8f7f68e14

                      SHA256

                      37d1e7acaa404d7c450a05a1d63ae39324a3d6425a48a84ccd3a73a0c578d544

                      SHA512

                      06e5acfade94ca106336727d00014b45069fd6dc4c4ced430f8ea9b1cc1fa1d757a6f4da16d4e53d404a6e4aa137e6ef58507d217e08188a24ef2e504315f0df

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      3KB

                      MD5

                      7358f94f306f366a61418964f0aa530c

                      SHA1

                      1c4c9cadd2418f9a4a3eafbe6379cd7ef00e4d4a

                      SHA256

                      f5a520687b42308a159d5948353b45bccb46500be9e5b5469b7554e408127a13

                      SHA512

                      3b613b3f20c36bf792574e78ecd5e30bfdee695025fef0b737b05f411c806f4c2b817842d34ca1d70ab7fc9b853f0c5e0fc231a839a6926290ae918f24c7dbce

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      3KB

                      MD5

                      ec959687def597405014c702209c2d62

                      SHA1

                      0971a79b8ee55cbb0b8612864ef0903cfba4b7e7

                      SHA256

                      2277e7a4ab50afff373dc0374983c2e601200baab04aa2e9091479b89b30b632

                      SHA512

                      a43e37cb75881797cb6e375eb207c2393c7bdf3e3347e1a0b4b6a10230430b3352b0f2652e063e1a26342e1244cc76f996e22dac57b71d8e06836ada770bce36

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\rfj66zji.default-release\sessionstore.jsonlz4

                      Filesize

                      3KB

                      MD5

                      8a5b7c5660f90bdd30a5b494649831f3

                      SHA1

                      554e4c118a6292c38610c987b52ade45a0843043

                      SHA256

                      91605593829c00d57511ed6f2cf767e418892c817269a4e11b790027d56eef7f

                      SHA512

                      2258a2e8eb5dc37ca3bbbf0b582f8b4b3d460f6e30652c0241b2371d4c6f8b8aee579e3b269aefd5da99f68da895a9f8b94ac603e27bc4ce8141da56e457d4aa

                    • C:\Users\Admin\Downloads\Socelars - 24.09.2022.zip

                      Filesize

                      5.2MB

                      MD5

                      ccaf8b6a14e94e5163c55b0b84a6a97c

                      SHA1

                      47c67a525e642808a1ce9a6ce632bc1e1fd3dfae

                      SHA256

                      966b5aa687ca823f72ed6054802e3347908fe1ace10336e682d96d5d66db68ae

                      SHA512

                      e82c8dd091dec5cb4e522296784c8e586a186af10598b6ad9f9feaa996c0898bb6988f602e8a32741a24bcb9f4c11e07d806e3323a46aeaafaee93b7cc1756c7

                    • C:\Users\Admin\Downloads\Socelars - 24.teEDvoVD.09.2022.zip.part

                      Filesize

                      31KB

                      MD5

                      5b26cd68a6c8ec6fb552800898d6b9fe

                      SHA1

                      2b1a060d4f0efb86bff9023bbce43fc9f625991a

                      SHA256

                      fa9c3a37dcf7d93997e53a32d6344682d3aa4566c619662872eb428f391ab474

                      SHA512

                      a12c7d95bf0054299f3881915fb70ed625b526e44e67ef29d98af6165f21af9f4233ada5e9b4cef720b67f2cd68c486ab11d9e6251da0880c729f95d750aed93

                    • memory/1812-415-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-414-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-421-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-422-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-423-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-424-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-425-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-420-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-419-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/1812-413-0x000001B4AA090000-0x000001B4AA091000-memory.dmp

                      Filesize

                      4KB

                    • memory/3828-312-0x0000000000FB0000-0x00000000019F4000-memory.dmp

                      Filesize

                      10.3MB

                    • memory/3828-292-0x00000000011EA000-0x0000000001498000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3828-291-0x0000000000FB0000-0x00000000019F4000-memory.dmp

                      Filesize

                      10.3MB

                    • memory/3828-290-0x00000000034A0000-0x00000000034A1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3828-289-0x0000000003490000-0x0000000003491000-memory.dmp

                      Filesize

                      4KB

                    • memory/3828-287-0x0000000000FA0000-0x0000000000FA1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3828-288-0x0000000003480000-0x0000000003481000-memory.dmp

                      Filesize

                      4KB

                    • memory/3828-311-0x00000000011EA000-0x0000000001498000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3828-285-0x0000000000F80000-0x0000000000F81000-memory.dmp

                      Filesize

                      4KB

                    • memory/3828-286-0x0000000000F90000-0x0000000000F91000-memory.dmp

                      Filesize

                      4KB