Analysis

  • max time kernel
    29s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 09:47

General

  • Target

    VExploit 7.5.exe

  • Size

    3.0MB

  • MD5

    b576d503248249aa9d80c75812735b95

  • SHA1

    07e528c971ee71afbf67381424a94278ddb168a8

  • SHA256

    26e99147a71dab9e54af91b164c7d6755e91d7e84b01907e74ef55aedcd00f44

  • SHA512

    0646222a0bc2fa3daa0ac9e79783c96c1ca6e7d59968ac2456865d5f030fbbbe87582fe22626cf86590b81d8a312275fb6358e632ba7a11ad18826928788cdaa

  • SSDEEP

    49152:NPlxT9CAot1ZewmTyGlj0cmGVmCWK0IK9LBRv3OUDr95NwmWWD3KpbQTV3:NPlDCjZkHluoTl49LBx3OU/N3MbQp

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 17 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VExploit 7.5.exe
    "C:\Users\Admin\AppData\Local\Temp\VExploit 7.5.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Windows\system32\curl.exe
      curl -s ipinfo.io/country
      2⤵
        PID:2644
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c
        2⤵
          PID:4476
        • C:\Windows\system32\curl.exe
          curl -s ipinfo.io/country
          2⤵
            PID:2940
          • C:\Windows\system32\curl.exe
            curl -s ipinfo.io/country
            2⤵
              PID:1812
            • C:\Windows\system32\curl.exe
              curl -s ipinfo.io/country
              2⤵
                PID:4384
              • C:\Windows\system32\curl.exe
                curl -s ipinfo.io/country
                2⤵
                  PID:5056
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM msedge.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4524
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM chrome.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1512
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM firefox.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5064
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM opera.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2524
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM brave.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5080
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM yandex.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:996
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM vivaldi.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4396
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM safari.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3928
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM chromium.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3484
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM "opera gx.exe"
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4292
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM "opera neon.exe"
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4356
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM "opera beta.exe"
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3644
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM "opera developer.exe"
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5044
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM "opera next.exe"
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2792
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM "opera portable.exe"
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4020
                • C:\Windows\system32\curl.exe
                  curl -s ipinfo.io/country
                  2⤵
                    PID:1948
                  • C:\Windows\System32\Wbem\wmic.exe
                    wmic desktopmonitor get "screenheight, screenwidth"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4596
                  • C:\Windows\system32\cmd.exe
                    cmd /C net session
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4848
                    • C:\Windows\system32\net.exe
                      net session
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1840
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 session
                        4⤵
                          PID:744
                    • C:\Windows\system32\systeminfo.exe
                      systeminfo
                      2⤵
                      • Gathers system information
                      PID:3336
                    • C:\Windows\system32\curl.exe
                      curl -s ipinfo.io/country
                      2⤵
                        PID:3420
                      • C:\Windows\System32\Wbem\wmic.exe
                        wmic csproduct get uuid
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1980
                      • C:\Windows\system32\curl.exe
                        curl -s ipinfo.io/country
                        2⤵
                          PID:1324
                        • C:\Windows\system32\curl.exe
                          curl -s ipinfo.io/country
                          2⤵
                            PID:4352
                          • C:\Windows\system32\curl.exe
                            curl -s ipinfo.io/country
                            2⤵
                              PID:208
                            • C:\Windows\system32\curl.exe
                              curl -s ipinfo.io/country
                              2⤵
                                PID:3064
                              • C:\Windows\system32\curl.exe
                                curl -s ipinfo.io/country
                                2⤵
                                  PID:4932
                                • C:\Windows\system32\curl.exe
                                  curl -s ipinfo.io/country
                                  2⤵
                                    PID:216
                                  • C:\Windows\system32\curl.exe
                                    curl -s ipinfo.io/country
                                    2⤵
                                      PID:2736
                                    • C:\Windows\system32\curl.exe
                                      curl -s ipinfo.io/country
                                      2⤵
                                        PID:1436
                                      • C:\Windows\system32\curl.exe
                                        curl -s ipinfo.io/country
                                        2⤵
                                          PID:2840
                                        • C:\Windows\system32\curl.exe
                                          curl -s ipinfo.io/country
                                          2⤵
                                            PID:3868
                                          • C:\Windows\system32\curl.exe
                                            curl -s ipinfo.io/country
                                            2⤵
                                              PID:2676
                                            • C:\Windows\system32\curl.exe
                                              curl -s ipinfo.io/country
                                              2⤵
                                                PID:852
                                              • C:\Windows\system32\curl.exe
                                                curl -s ipinfo.io/country
                                                2⤵
                                                  PID:1204
                                                • C:\Windows\system32\curl.exe
                                                  curl -s ipinfo.io/country
                                                  2⤵
                                                    PID:2524
                                                  • C:\Windows\system32\curl.exe
                                                    curl -s ipinfo.io/country
                                                    2⤵
                                                      PID:2592
                                                    • C:\Windows\system32\curl.exe
                                                      curl -s ipinfo.io/country
                                                      2⤵
                                                        PID:892
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /F /IM Telegram.exe
                                                        2⤵
                                                        • Kills process with taskkill
                                                        PID:2800
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /F /IM Telegram.exe
                                                        2⤵
                                                        • Kills process with taskkill
                                                        PID:1800
                                                      • C:\Windows\system32\curl.exe
                                                        curl -s ipinfo.io/country
                                                        2⤵
                                                          PID:3484
                                                        • C:\Windows\system32\curl.exe
                                                          curl -s ipinfo.io/country
                                                          2⤵
                                                            PID:1432

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\GB194.110.13.70\google-chrome\creditcard.txt

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          dea7fabb1b7cf2df9681fdef82889e76

                                                          SHA1

                                                          0557a00f80857b8718805f6df479bba59a727b32

                                                          SHA256

                                                          6eaca42ff0ed132865abc8bcb40dc514b92508980f0ee9432e9602fb64131f49

                                                          SHA512

                                                          c82ca9bde13fe5e196856c21efe68178f4d732cd7d59c708c6ff8b6c34b38f143d2cec112a777d8e616fdee6941de42777b1ac152b814427deff23a006fa8638

                                                        • memory/3580-0-0x00007FF7499A0000-0x00007FF74A212000-memory.dmp

                                                          Filesize

                                                          8.4MB

                                                        • memory/3580-2-0x00007FF7499A0000-0x00007FF74A212000-memory.dmp

                                                          Filesize

                                                          8.4MB

                                                        • memory/3580-4-0x00007FF7499A0000-0x00007FF74A212000-memory.dmp

                                                          Filesize

                                                          8.4MB