Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 10:39

General

  • Target

    Open AI Sora Vesion 5.42.exe

  • Size

    157.9MB

  • MD5

    167af794837fe9de07ee83acdb74343e

  • SHA1

    a3f718d502a0f9e8382d12da9704433b96ea53ed

  • SHA256

    06c81d76f89cd374efcf4140b1f8239f30a89b1132608c3696e64199c9d9bd0c

  • SHA512

    8e78779a4d43604e705335c45569137ddc0b8b5448d15c44c1bb0fae59c95457dfa896bb3671aec79a0082f104ffa61182453218f759669320b9cba909c0d588

  • SSDEEP

    1572864:FHMlnmXXHfarJ2MH6rd07/eGpQvyLxCi70QzyhpPc2qfF4SagVnhqODQA86:NInmXXHfatH6dg/eiZzwJgFo

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Open AI Sora Vesion 5.42.exe
    "C:\Users\Admin\AppData\Local\Temp\Open AI Sora Vesion 5.42.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "msedge"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4280
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2644
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4732
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    153965a65ce1a432d10ce780a2ce101d

    SHA1

    e18b06b1bc727c80024b61dcb2b2d9166f1fe14b

    SHA256

    3b8ef33656fb559ed40c9438a6014c641fb687e1d6cb7541a87771ef47ac2412

    SHA512

    da365d9805bcaa38867442cdedcf9c754bf12f99a0fba60b84321ab815388345c2a6c6ccec1365c75e93e19c2c89b1c43691709958a4f323ab8cbe0d1d685ccc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    d608a336d648a5ccb7e7283bc43904b6

    SHA1

    0446957c799d407dbf6bbc18858efd84cf2be29f

    SHA256

    181b88d495fdbfa6a5d4908fa0cdbaa4d20c8a73b9ec917c4f3627dff6f9bfff

    SHA512

    c500589a8d3c404ad9ff030f8952c5ee4b8b1c54b81a468710e1a2bab6affb70387f79b007adb87dd3db4f5e5eb0256b0b153662e6ab2989d4d0eb464f18a7a4

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ukrrzha1.1ul.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1684-32-0x000000000AD10000-0x000000000ADB5000-memory.dmp

    Filesize

    660KB

  • memory/1684-44-0x000000000AE40000-0x000000000AEB5000-memory.dmp

    Filesize

    468KB

  • memory/1684-12-0x0000000006710000-0x000000000672D000-memory.dmp

    Filesize

    116KB

  • memory/1684-16-0x0000000006770000-0x0000000006798000-memory.dmp

    Filesize

    160KB

  • memory/1684-13-0x0000000006770000-0x0000000006798000-memory.dmp

    Filesize

    160KB

  • memory/1684-9-0x0000000006710000-0x000000000672D000-memory.dmp

    Filesize

    116KB

  • memory/1684-8-0x00000000065E0000-0x0000000006687000-memory.dmp

    Filesize

    668KB

  • memory/1684-20-0x000000000AAC0000-0x000000000AC4E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-36-0x0000000006CB0000-0x0000000006CC5000-memory.dmp

    Filesize

    84KB

  • memory/1684-17-0x000000000AAC0000-0x000000000AC4E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-60-0x000000000AE00000-0x000000000AE3C000-memory.dmp

    Filesize

    240KB

  • memory/1684-56-0x000000000AF20000-0x000000000AF9A000-memory.dmp

    Filesize

    488KB

  • memory/1684-53-0x000000000AF20000-0x000000000AF9A000-memory.dmp

    Filesize

    488KB

  • memory/1684-52-0x000000000B3C0000-0x000000000B456000-memory.dmp

    Filesize

    600KB

  • memory/1684-49-0x000000000B3C0000-0x000000000B456000-memory.dmp

    Filesize

    600KB

  • memory/1684-48-0x000000000AEC0000-0x000000000AF14000-memory.dmp

    Filesize

    336KB

  • memory/1684-45-0x000000000AEC0000-0x000000000AF14000-memory.dmp

    Filesize

    336KB

  • memory/1684-41-0x000000000AE40000-0x000000000AEB5000-memory.dmp

    Filesize

    468KB

  • memory/1684-40-0x000000000ACB0000-0x000000000ACC1000-memory.dmp

    Filesize

    68KB

  • memory/1684-37-0x000000000ACB0000-0x000000000ACC1000-memory.dmp

    Filesize

    68KB

  • memory/1684-33-0x0000000006CB0000-0x0000000006CC5000-memory.dmp

    Filesize

    84KB

  • memory/1684-57-0x000000000AE00000-0x000000000AE3C000-memory.dmp

    Filesize

    240KB

  • memory/1684-29-0x000000000AD10000-0x000000000ADB5000-memory.dmp

    Filesize

    660KB

  • memory/1684-28-0x000000000AFB0000-0x000000000B306000-memory.dmp

    Filesize

    3.3MB

  • memory/1684-3-0x0000000006CE0000-0x0000000007669000-memory.dmp

    Filesize

    9.5MB

  • memory/1684-25-0x000000000AFB0000-0x000000000B306000-memory.dmp

    Filesize

    3.3MB

  • memory/1684-5-0x00000000065E0000-0x0000000006687000-memory.dmp

    Filesize

    668KB

  • memory/1684-0-0x0000000006CE0000-0x0000000007669000-memory.dmp

    Filesize

    9.5MB

  • memory/1684-24-0x0000000006B90000-0x0000000006BC0000-memory.dmp

    Filesize

    192KB

  • memory/1684-64-0x000000000B350000-0x000000000B362000-memory.dmp

    Filesize

    72KB

  • memory/1684-61-0x000000000B350000-0x000000000B362000-memory.dmp

    Filesize

    72KB

  • memory/1684-21-0x0000000006B90000-0x0000000006BC0000-memory.dmp

    Filesize

    192KB

  • memory/1684-4-0x0000000000544000-0x0000000000545000-memory.dmp

    Filesize

    4KB

  • memory/2644-178-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/2644-191-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/2644-176-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/2644-177-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/2644-184-0x00000000061C0000-0x0000000006514000-memory.dmp

    Filesize

    3.3MB

  • memory/4280-143-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/4280-159-0x0000000006080000-0x0000000006116000-memory.dmp

    Filesize

    600KB

  • memory/4280-146-0x0000000005540000-0x00000000055A6000-memory.dmp

    Filesize

    408KB

  • memory/4280-158-0x0000000005BA0000-0x0000000005BEC000-memory.dmp

    Filesize

    304KB

  • memory/4280-153-0x00000000055B0000-0x0000000005904000-memory.dmp

    Filesize

    3.3MB

  • memory/4280-157-0x0000000005B70000-0x0000000005B8E000-memory.dmp

    Filesize

    120KB

  • memory/4280-145-0x00000000053E0000-0x0000000005446000-memory.dmp

    Filesize

    408KB

  • memory/4280-144-0x0000000004CD0000-0x0000000004CF2000-memory.dmp

    Filesize

    136KB

  • memory/4280-141-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/4280-142-0x0000000004DB0000-0x00000000053D8000-memory.dmp

    Filesize

    6.2MB

  • memory/4280-140-0x0000000000E10000-0x0000000000E46000-memory.dmp

    Filesize

    216KB

  • memory/4280-139-0x0000000073A6E000-0x0000000073A6F000-memory.dmp

    Filesize

    4KB

  • memory/4280-160-0x0000000005FA0000-0x0000000005FBA000-memory.dmp

    Filesize

    104KB

  • memory/4280-161-0x0000000006010000-0x0000000006032000-memory.dmp

    Filesize

    136KB

  • memory/4280-162-0x00000000073A0000-0x0000000007944000-memory.dmp

    Filesize

    5.6MB

  • memory/4280-165-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB