Analysis
-
max time kernel
149s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240802-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
17/08/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
superiorityFixlld..scr
Resource
win10v2004-20240802-uk
General
-
Target
superiorityFixlld..scr
-
Size
7.9MB
-
MD5
be92f99f33ee6550e6f8c43b2ee1fe03
-
SHA1
f8521a26ea702df23985af4b43e59119c8895544
-
SHA256
07a97ead754a2e394483fb32eec4f6f2cb063d497089ef1fb03b942b6a371d03
-
SHA512
bf8a5600e2e0782075e7d52c6936a0045bc53bf8210136fc60f1966b76856f450e0ad755edd3f07e7274ca57c1e043ddd96ea23c128286d774a9e9b84ad1d37e
-
SSDEEP
98304:GaslCx7oFJWk5THpvT3L7mn5Uz8203h/R2dt5TinhX:G3CKnWQTH5m5UbaZcpTi
Malware Config
Extracted
sharpstealer
https://api.telegram.org/bot7033911549:AAFm822dQHF6seFxiy7DwDnEM71DQula7cY/sendMessage?chat_id=6942274023
-
max_exfil_filesize
1.5e+06
-
proxy_port
168.235.103.57:3128
-
vime_world
false
Signatures
-
Sharp Stealer
Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation superiorityFixlld..scr Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation LocalqufdyMhDsk.exe -
Executes dropped EXE 2 IoCs
pid Process 2964 LocalqufdyMhDsk.exe 468 windows.exe -
Loads dropped DLL 1 IoCs
pid Process 468 windows.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 api.ipify.org 21 api.ipify.org 24 freegeoip.app 25 ip-api.com 26 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LocalqufdyMhDsk.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier windows.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 windows.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 468 windows.exe 468 windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 468 windows.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2964 1084 superiorityFixlld..scr 84 PID 1084 wrote to memory of 2964 1084 superiorityFixlld..scr 84 PID 1084 wrote to memory of 2964 1084 superiorityFixlld..scr 84 PID 2964 wrote to memory of 468 2964 LocalqufdyMhDsk.exe 88 PID 2964 wrote to memory of 468 2964 LocalqufdyMhDsk.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\superiorityFixlld..scr"C:\Users\Admin\AppData\Local\Temp\superiorityFixlld..scr" /S1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\LocalqufdyMhDsk.exe"C:\Users\Admin\AppData\LocalqufdyMhDsk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
3.2MB
MD50cf454b6ed4d9e46bc40306421e4b800
SHA19611aa929d35cbd86b87e40b628f60d5177d2411
SHA256e51721dc0647f4838b1abc592bd95fd8cb924716e8a64f83d4b947821fa1fa42
SHA51285262f1bc67a89911640f59a759b476b30ca644bd1a1d9cd3213cc8aae16d7cc6ea689815f19b146db1d26f7a75772ceb48e71e27940e3686a83eb2cf7e46048
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
1.7MB
MD5a73fdfb6815b151848257eca042a42ef
SHA173f18e6b4d1f638e7ce2a7ad36635018482f2c55
SHA25610c9ccec863ed80850c7b7080e4f2e34b133ce259d1ae3ea7a305cebf6e2940d
SHA512111f5a7bd916ab317fc127cbf49a2a81c2a614ce3a655a0446f2ebf3c2e61509db5633a391bef06c4ba0b58a71c752262ec2467a09abc56827263c647b08a09d
-
Filesize
402KB
MD5b0911d27918a1e20088b4e6b6ec29ad3
SHA193a285c96a4d391ea4fe6655caaa0bbf2ee52683
SHA25624043ef4472d9d035cd1a8294f68d2bbfdf76f5455af80c09c89e64f6ed15917
SHA512518da2e73b849be38570d7db218adeb47f85fde89c15dac577eb1446a9a55bb4cfaf31d371428b9c4f0c69c0be3e2cb10fafcadbec24e8ab793b639392e3f029
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
396KB
MD52faf9f22db741b5aa08f154827a989f6
SHA1441c6773c370df023e8cc7ad2f09a71662f69d87
SHA2562c80a1708464ab129dca397ae4576a285e6bd553ec810f7e4e6a61801ecc2b18
SHA51296a51b02adb518bc13e38d5e06b9c3f05f0da84c89c72a181a1082e552196e886ad4a7f8a27281e00e44b36c14d31ac8088eb71237c04460308d30a2609cd50c
-
Filesize
4.1MB
MD53b255d9bfc63ddf4bf11dc46ac0ca230
SHA1f6b5abb79b2a3c2d626ef0a8afbd7ecd4669f8bd
SHA256daf4826e3300ecaab08f0af439151dc6b0603633994bad62df7c34e92dc52dc3
SHA5125582c96ec5def8b82949a7c4a18dd7551889e764bf802d990847d8189131a457b34bb6f748a0217808725862fd2d6ad95f4fd35af769a424109cc30fc44466d3
-
Filesize
744B
MD52abd5d8398c76a78b6c29767080902de
SHA15015e55117fd68733a6c307fdfa40ebe4ef23cb9
SHA256760bf1a38b2db9d6a6512239041dfe284a0e52e11dcf6544ac0c77885b528b90
SHA512cee01f2ace7d76175d883321b193236e9c0c94c07c067083a09e212718977c5decc1c6638447461a08170fcbe20c60b5658c6edd7501c57cefd811c5411745e0
-
Filesize
1KB
MD5557fd48264703582875b5797bcb1ee59
SHA1a41e0e543a254a9be008d2341f65887323f71df2
SHA25622724ab90f5fbd1e03a1b53ab9f1d1fce4263c0062368e72ba694c23446343c4
SHA51241653d8b0c09e88a5cd9f7521c6518284cb465ee743f72d1908d663417c4dc0f95df0fb5d04b6e4a75fa86afe465f98a2604d4ba1404295a8973a777a72f086a
-
Filesize
1KB
MD53be985ba45cdc9c24ef5311851df3f27
SHA12d8d4015d88b38fa7af518ae97f2cc6dffc5bc1e
SHA25631109eb51b533c18ad7078a71a5b07939c40b95224d1b661eb6a991ec06f1284
SHA5120758bfcac56b634a9c7045f5e4e6e2e5c77741445b53abfa9755842a6d50faf4be5607db62389fd85093a62ed0b42007fd9508966f298a3baa7aaf22edc6ccba