Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 02:14

General

  • Target

    d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe

  • Size

    24.9MB

  • MD5

    f958ea0a67c8a881fc61b3dedd599015

  • SHA1

    f1e659ae6173811e11a31194c3b69d836f2588e4

  • SHA256

    d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5

  • SHA512

    b105f407db1ed108b915aff6cd72ac8320030298ee5fb22e48501dd68e053efaf14f67a850a1f2a8853ae5b3f3816225ff95744bae5035bb37b4e9f8a11a4f35

  • SSDEEP

    393216:dOe1yI9bTUfSHt1CPwDv3uFhFU2lvzVfWtTpK6aGV:YI9bDMWtNK6aK

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe
    "C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\main.exe
      "C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3480
      • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\main.exe
        "C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe" "--multiprocessing-fork" "parent_pid=3480" "pipe_handle=568"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im chrome.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im chrome.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:64
      • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\main.exe
        "C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe" "--multiprocessing-fork" "parent_pid=3480" "pipe_handle=668"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im brave.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4344
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im brave.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4948
      • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\main.exe
        "C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe" "--multiprocessing-fork" "parent_pid=3480" "pipe_handle=360"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im opera.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4064
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im opera.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4580
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im vivaldi.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im vivaldi.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4168
      • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\main.exe
        "C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe" "--multiprocessing-fork" "parent_pid=3480" "pipe_handle=464"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im msedge.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4152
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im msedge.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3040
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "ver"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4804
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "ver"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2356
      • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\main.exe
        "C:\Users\Admin\AppData\Local\Temp\d46c5c85afdf94bb9bcb01a539f29613457c5aca922e7732de61ea44d8f4e1a5.exe" "--multiprocessing-fork" "parent_pid=3480" "pipe_handle=504"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im opera.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4588
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im opera.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4112
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im browser.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3776
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im browser.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_multiprocessing.pyd

    Filesize

    26KB

    MD5

    041f7e61e4bd55695c16ff9744ddbc6c

    SHA1

    fdbf3d62f2dc8fb919d68163a22b378f2d9104d0

    SHA256

    18b68e538071d7f8639b3de22ec0cdc3c58b8b9ff432b57a6f48685080cf53f1

    SHA512

    d117a144bee13138d518d09a8898db6ec469b8e144edf8bebd7e6d223d402452ef96888b791f132e0e3e67f8bb90315ae3119019c34b86d7a0b1ace19a704673

  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_queue.pyd

    Filesize

    25KB

    MD5

    9c0c539995b717cacd4712ddc4d6ad0d

    SHA1

    d24b2a12013baa574eb031e2f44ef5a14f35723d

    SHA256

    ae224c1244be37be40dffd4f9e53a1af21a5a21d9657db4bb227055c1e2ee8c1

    SHA512

    1172f3e66b46d9a7c995aac1b82342da1ef945a75b14dd3ea0b921cc979954d8da2e5b07534880dc951670635e560697d16242f442c1ce3cbe5d29136013bc5a

  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-1_1.dll

    Filesize

    2.2MB

    MD5

    31c2130f39942ac41f99c77273969cd7

    SHA1

    540edcfcfa75d0769c94877b451f5d0133b1826c

    SHA256

    dd55258272eeb8f2b91a85082887463d0596e992614213730000b2dbc164bcad

    SHA512

    cb4e0b90ea86076bd5c904b46f6389d0fd4afffe0bd3a903c7ff0338c542797063870498e674f86d58764cdbb73b444d1df4b4aa64f69f99b224e86ddaf74bb5

  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libssl-1_1.dll

    Filesize

    531KB

    MD5

    8471e73a5594c8fbbb3a8b3df4fb7372

    SHA1

    488772cb5bbb50f14a4a9546051edef4ae75dd20

    SHA256

    380bb2c4ce42dd1ef77c33086cf95aa4fe50290a30849a3e77a18900141af793

    SHA512

    24025b8f0cc076a6656eba288f5850847c75f8581c9c3e36273350db475050deee903d034ad130d56d1dede20c0d33b56b567c2ef72eb518f76d887f9254b11b

  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

    Filesize

    24KB

    MD5

    3025c424248f26b0524cf269e04069a0

    SHA1

    c1186b317ea23769bda544b7f9e9e5441120b153

    SHA256

    1c38d8d46dc1ecee3014f3b5088d2fa31cc1616364b535708129f0df4ca89a8a

    SHA512

    dcee210dda2fd8d5331d70e095fff277dfee2bc2d50cffdad48338adbde35d09807ef831eff56b97e117569faa97565f476be5debc8694233f2be68b02cb83ed

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\VCRUNTIME140.dll

    Filesize

    74KB

    MD5

    afa8fb684eded0d4ca6aa03aebea446f

    SHA1

    98bbb8543d4b3fbecebb952037adb0f9869a63a5

    SHA256

    44de8d0dc9994bff357344c44f12e8bfff8150442f7ca313298b98e6c23a588e

    SHA512

    6669eec07269002c881467d4f4af82e5510928ea32ce79a7b1f51a71ba9567e8d99605c5bc86f940a7b70231d70638aeb2f6c2397ef197bd4c28f5e9fad40312

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_bz2.pyd

    Filesize

    76KB

    MD5

    67e05ff657b3b2b772baf150eec08166

    SHA1

    e9351bb735a2edccd76f88efbcbcdf8404ea9157

    SHA256

    889d5107cd3075d1903324dabb53ae37eb9d528a3aa96015097a68adbed6c2a4

    SHA512

    7c490a9790d8ad92d344d9f278ae75d459e7ef014db02f22f86a560613c4daf6a0cefd858a24f4e717e7ec0e3de9e4ff956155929a06bf65bf8c58a33e79fc05

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_ctypes.pyd

    Filesize

    114KB

    MD5

    43b04ec05b30c5fedcce40e32bceebd0

    SHA1

    3ca32cd7a5634a31d9d4f6b99ab701ba19c50178

    SHA256

    58a586e7ac7e414a40359d322af6918578b15edc44fb03d5b2bb80689e746f90

    SHA512

    d08c259667b6c52590550a34513c994d7ef08ec3c2dbcaf73cc3ef1814961856805a3c5d7fa9b8895688daef41de66aa117697cf70b21c64df13e82df73cb853

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_elementtree.pyd

    Filesize

    185KB

    MD5

    06f8a0845cadd9420f45700640fde40f

    SHA1

    25cd66cfa6d3c61d7f068a7aa069832aab210e63

    SHA256

    5daa35854f450f7086b1a5ff4f93f856c4e29cfc2fc93522605b99a1ff31e7c5

    SHA512

    4665bbbadc5ebb42fe023cb478307a5b317909145109486abbdb9f2dec2004bb44151171db17c2b62d6a6896c65e209feb4ebf9c617f49e5067f0f780c83ce55

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_hashlib.pyd

    Filesize

    51KB

    MD5

    614a3ad946d087b6a34714d9bead9b87

    SHA1

    60d85ef3a94449e37bc3632e5f655ae525a4c2ed

    SHA256

    d04ec1e7c86872c5eb316675a812664e1e31ce89c4245c4099c617662e13e8ca

    SHA512

    ea3c1449b088174f92d0d8f864afe88150c2fc795d31d96308e97f1db70685ccf39d8d0eaf265e1f21b933f7495170a3acfc8c48dc35c71078b4df3ae0dd9a46

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_lzma.pyd

    Filesize

    158KB

    MD5

    92760fcb041044d20fc88f0f2ecd9e3c

    SHA1

    4105c5318e91e897aa09aca760fa0ec730016774

    SHA256

    865c0eafb643f0659af5ef51b7e96e3ba817e6255de119510a9eebbb09a1761f

    SHA512

    d8ee382f950f50008f7c33aee740c2feb0b413cd9d806ec122d0919bf45a126321a7ad758772617d3258665ad6844b834860dc814468ab05090a998c55e5c5d1

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_socket.pyd

    Filesize

    69KB

    MD5

    5e907083789feb1d20ec4dbc8f54692d

    SHA1

    a7b7bc63d73160785652fa6af0ffafa5402c49fb

    SHA256

    352adeb7697594dd0dc0917b853f44860759d65270f14d821ecaad32793300c4

    SHA512

    4c0caf59a0c12f26716be815a139950cf0c576e7aca5e5c67087b6f9d49db610b1a55afafebe3eb9de9f6d813dbba43dcddf802ba1674da852c935bc35adc5e4

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_sqlite3.pyd

    Filesize

    67KB

    MD5

    daf171b7aa08b7b5fbc8a065a19628a1

    SHA1

    e30e95daa589448708139db8e1e234c8999d8bc4

    SHA256

    da28e0e4c375dc590116b4bfa02d5ef004e6144e47eaa963d73d22b5bd950580

    SHA512

    8d1f0949f0ecbdbdd986565512ebadfaaca5eff861709ac40eec0bfa858116438a367d286a7e370f28695752cb18687677f5df45728de9e1ca125bef89a71c4e

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_ssl.pyd

    Filesize

    139KB

    MD5

    f66c42b751835bd2d1dd1f35b49140e6

    SHA1

    902055cb0b044e2d190c7cbe81144d542b10f691

    SHA256

    a77bb916005ea8a38e88e903d226b78f4b839ebe7612994bae2f1c14fbd14f6a

    SHA512

    6fc3644fa8a927c0f43d3cdb61e89a45bd81fce8fe39a969b915c954370b5db361eb6eeaa8f5c7dfa77b023ad99b6c9a44c1b5a7b9cbc4b61523a89967496497

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\_uuid.pyd

    Filesize

    20KB

    MD5

    e12765a8deb564b9b91a45ee941060af

    SHA1

    3e21a100510e67ac156436c65b0b72a24fc2494d

    SHA256

    692c33e271f5bd01ce69f25d357ccedc40cb1f4998735e2e4b0bfddf9a81c8f3

    SHA512

    1509d833f8e14c1958254ed4e9c52b60bf65fa7de42bfe94a8a506d10f20ba4b265facc535a158d3fb07fa72b3074b8bb9471024ffd85df039371d4826ed43f1

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\libffi-7.dll

    Filesize

    28KB

    MD5

    bc20614744ebf4c2b8acd28d1fe54174

    SHA1

    665c0acc404e13a69800fae94efd69a41bdda901

    SHA256

    0c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57

    SHA512

    0c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\main.exe

    Filesize

    9.2MB

    MD5

    7e21ccfa0c22c9594573540ecf9ba910

    SHA1

    4a010875c4cc7696313b4045cb94734529492dc5

    SHA256

    eb323bdc80dbdff61412c1a3cc3054cdd09675b7a860711710095afa3614f70f

    SHA512

    e4b0453d633d38387bf948a9c68ebb0dce308a4693254561e56312fe8f8b84b9e84a4d67be7e53bc372e57e7ce99b295350d4f2b23f7bac4465130a97247a531

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\pyexpat.pyd

    Filesize

    176KB

    MD5

    391d6db3a4e4e56f3bb5e01ba991684b

    SHA1

    86605c6b91e738ec99756cc1a9a1974a6f1f7e48

    SHA256

    c66ce2172a74318574f3ebe6eb372047f3882366dbe8bef420fab9dc144221d8

    SHA512

    6ceb09a25745a5c968695617e2d9fabf20794b31d69b65efbaf61337da3e2c6fa962d3b2b9e8c4e1fcaebd2b782edcc6b3b741e65b93c76cdbb69738800a353d

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\python39.dll

    Filesize

    4.3MB

    MD5

    c56f21fb7a2690444fa5f479792fd438

    SHA1

    5280b716d65acdc91e0505672aabc2174ed360b4

    SHA256

    20f0fe9ffd669cb02a1e34e01df805a86244233c8644d22cebe6e9295a361738

    SHA512

    b916b63ed43c072dbf6fd77a5f8b505f0632a11a9d7f6a118a4bd5082c1060eb1637b70a17f6a5e8494bae77835ac996b47a4c7e32dafb5e7275090b0684bc85

  • C:\Users\Admin\AppData\Local\Temp\onefile_3720_133674705045689973\sqlite3.dll

    Filesize

    1.2MB

    MD5

    f03bf8f926c3b1e88a1ca8ffc0bd2857

    SHA1

    02077832650229e57916f80b8c282855839e2a76

    SHA256

    34887dd336bc8af5fcbe89b2690325146129a564092e3c40c6ee0692741ab71a

    SHA512

    e63dba94b46482e5c2863dada1c8fe67f058a225a93aa7a77c6b69e243ec0560478c8ab95cab0d56116426cd05502c445a291ca52dcfee5764e90846918d9df3

  • memory/860-162-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-160-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/2832-158-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/2872-161-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/2980-159-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/3480-108-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/3480-164-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/3480-170-0x0000000000E80000-0x00000000017C9000-memory.dmp

    Filesize

    9.3MB

  • memory/3720-107-0x0000000000780000-0x00000000007A4000-memory.dmp

    Filesize

    144KB

  • memory/3720-222-0x0000000000780000-0x00000000007A4000-memory.dmp

    Filesize

    144KB