Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
submitted
17-06-2024 16:44
Behavioral task
behavioral1
Sample
a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe
Resource
win10v2004-20240226-en
General
-
Target
a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe
-
Size
393KB
-
MD5
2b22bd7790dfd1f241a512918e814133
-
SHA1
bcdb2f6cab3c32d0382dd8d09ee7ab8ce9ea037b
-
SHA256
a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141
-
SHA512
38e64215b9561267322e2724d0e1d994015f88c2b3b2e7fbe3fafc77cbfd92f17ef3fb994e8a8f1e3a020972241ceaf5f77a7888de1a81e019722566c9005184
-
SSDEEP
6144:p/SZwCDkBDKpVtXIoEpGy8Un02o/7U9398hBg9w5Jq/lJwam9erm7Tu1E:pDCYBDKb2Gy8Un02oTURSY06w1AT
Malware Config
Extracted
sharpstealer
-
max_exfil_filesize
1.5e+06
-
vime_world
false
Signatures
-
Sharp Stealer
Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.
-
Sharpstealer family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org 11 api.ipify.org 18 freegeoip.app 19 ip-api.com 20 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exepid Process 2304 a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe 2304 a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exedescription pid Process Token: SeDebugPrivilege 2304 a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe"C:\Users\Admin\AppData\Local\Temp\a5ef342482499489ef303c5f95a9684bff503a9c7c44b16572a4c7ebe60f1141.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD54792c952ce914d9a6a275947afa6cf64
SHA1ab3f3477dc71fa2f7e0abeb4853d0437245dd311
SHA2563d7e4d8d97d0916ee5f7dc45ad078015039d675d87f1e92638c376569d8dd8ac
SHA51273b42128bd40c53683c4f2e4a89c227bb4a1876b3885c1fe2915552bc3c6ebaba383b82006e004584e1cdf526a4eda05cfc4009659e11ebe2940e08469db15b2
-
Filesize
192KB
MD58ccb6c13863fb6e99ed9a29a95f273fe
SHA1b809aadcbd64fc29edb0cf27fb223784563a911f
SHA2566b5e07d7137e1d3bee13888a7e8c81fae36ef046c9c7ba074e5fef67e6a594b4
SHA512635bd5e4a1f9c0bf4dd331912f47d65de52496ae4e8fd8de84fac2008064c5c07b60fc33dd318cdf091ad9de2d14a0ff326a95d14f8084f0e5abbcaa98c7f0bb
-
Filesize
1KB
MD58d210b00e501213653b968da1fed3682
SHA17e61baf9650392cf2f39bcf49baa6835fcc07af8
SHA256418b0ca6f1925108478908e9f86eecd2f7a4fb355ce535a32f698322f4a01a84
SHA5128fbf707e3272c04c6758fb234bd89af5029b7f5cab0e91e856eaca7dfc8a156cc7429c69996071a6564de5f94038dc88bd5a9af3275f8538c89027cda1312532
-
Filesize
544B
MD524a9b6c29abf486986231b7c81d875b7
SHA10b4d765e76d1b28f5fa41d71b4db8f6595ca8e63
SHA2564fe436bb8303cdd3a5f9e436ec34c072bd328c467122cfc8803f479aecc99870
SHA512130175ca4eae9eb882d9e3e5b9c0a38f78c2e32e8851e44aa5dd8a4f5d0ad1207b80319325806b70b2b51a8c1a68033c769f1253a3dd2b5b4b44aa8d2c11635b
-
Filesize
692B
MD5ee690de8de5ae4fc0e056e2d8a410976
SHA15c2a25de02fabed9d1f627664f37646c54aae9b5
SHA2567dfec60f3633553b3281f4f42ea882b9115cb0b7d4839082733eede39413a2c8
SHA512363e09bf9dad8e2d832b87263074bdbd84c0bb0e90c2ecb69470040e94c66a1160f23578c1a0ab0e9b20302e5d2d26411712a15939fc3c0406f3d4e3c6380be2
-
Filesize
705B
MD5a8155ebf9af9244f5b9fd4bb468b99b1
SHA1a86efa850fd7e1a7b7e42e63fc6080c299d3eeba
SHA256b6a5eedb340327271895e64c946bb33b67af77e6ffb4f66c37ec7ee43fa8b9a0
SHA51209b4b336890ca089e56b9223036b7c58d202b670254aa15198c4da4d62cdba9f3de1d28e1354ff95f9c07e8eb6ce677fa321640b0565818c3738eb58d9663c48