Analysis

  • max time kernel
    65s
  • max time network
    67s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 13:55

General

  • Target

    injector.exe

  • Size

    4.9MB

  • MD5

    fc502a9919380ad3e3abe216606ccf65

  • SHA1

    be529f58e69bf7de944cec6cf766343e946535bb

  • SHA256

    75cc2c6147746741e1f3b89f1557d3b68fcce002adee182db4c0034a3e19e68c

  • SHA512

    998ee98d6c9373e5a1ae950c831b39ecfe99aada5dee7bbdd6f1f83bd64c792d4a75933c0080e3ab7a85c18b8aa0dec4d9e67b9e6e53979d690f516d06bc82a6

  • SSDEEP

    98304:eNrvVUzoSmtaMnsJw6vFZXHwF5oHK6y3EGTa7oH:eF9uoScaVa691OiHRuTaS

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\injector.exe
    "C:\Users\Admin\AppData\Local\Temp\injector.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2112
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe9d44cc40,0x7ffe9d44cc4c,0x7ffe9d44cc58
      2⤵
        PID:408
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2064,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2060 /prefetch:2
        2⤵
          PID:2760
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1928,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2516 /prefetch:3
          2⤵
            PID:2852
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2128,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2620 /prefetch:8
            2⤵
              PID:4876
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3200 /prefetch:1
              2⤵
                PID:1284
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3384 /prefetch:1
                2⤵
                  PID:4072
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4672,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4684 /prefetch:1
                  2⤵
                    PID:2112
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4760 /prefetch:8
                    2⤵
                      PID:3716
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4836,i,11921090240953541489,13932423663981476192,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4812 /prefetch:8
                      2⤵
                        PID:4160
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:4952
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:780

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\140efc5a-f907-44f8-b950-e9b492d41f8f.tmp

                          Filesize

                          8KB

                          MD5

                          9f0c796337f6ba69e5c259a12b69e31f

                          SHA1

                          a1acb58056ff9e9ceb1b21bcce9f9f67e93bb244

                          SHA256

                          bda7e27ee154bb1d44b7eb61aa660e2c8ef336cb6e0f378d7ee19e82bc5958d6

                          SHA512

                          1a3f2dbcb3d6128c000eca05a8e62b299c220544d39222fdd6644d43b770b5f20e0d7d373a2e1fe07fe654e67dc50e6427098bdf4bf652fa21a877b00f2ddecc

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          31b5aabd040bd9abb1a6582a39611506

                          SHA1

                          5f1c36662a570b16e4867ba3961ddebcfd851ae2

                          SHA256

                          c35fc7c6394b567b6d9050c757756e2c32056d15342de19259645241ddcda2df

                          SHA512

                          5e7b9fbf8a6373e6458301d97a39aa67a5a07efd7cff484d6d50020623eca2ee9120afe94657662f2ba59794fbecd2476cddf973e2ec465c2226cf517259ec3c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          7a44a1200bc187cbeb23267e60bb61c4

                          SHA1

                          ac8beda1603336f43ada36fb8ec1d931f395f3d1

                          SHA256

                          1cfe958a0fa8fb10f3607f4ce9b62381d40152740fec09eeee6123c9c862e091

                          SHA512

                          1e6804dfca39f266939e3770ce69dde6f21cfeb0e65af98ac2bd7d6fe17db0f1261ce0b5d2d9ef7ca5722e4273bf800522886d2aed2cf2bd8e88cc6f48ae3e87

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          356B

                          MD5

                          deb38ae703da2fce3c184a14785c6387

                          SHA1

                          e70ffd06fb971aa86377ca82e3be32393070a349

                          SHA256

                          a8f78f534fbca7dcd7c68237520c62d7f437c12215198c2bd593e1c9545a9251

                          SHA512

                          3727d7522411e7e8e4810346548d49c21887e648e666b238543b2e624ade7daa75081589d408710d557a788a685406242eaa42541e853c5d58f63adef9a9ac94

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          13KB

                          MD5

                          b7b48cc12271bd85747cf11962a9fab2

                          SHA1

                          6cf38f3df58a2d39d38ed562c5a044f666b9885b

                          SHA256

                          28a24fdc454cb4d38110b405eb999c0fe938aeb6ac0ecc8d501b6494736742f6

                          SHA512

                          61854231c391797ec123e83cb15191e1b6cec59e1820d6e0dc76cda65335e910001b9b433e13d0d47c5811077372e662feac9358d5c8badafb0926630f414d9a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          197KB

                          MD5

                          11d59d2f1675da14137b8302167a96e0

                          SHA1

                          d7409e9633142d6811f3af5dc32c9965fd4b5995

                          SHA256

                          dc05f216a3fc2765b9d690215e3a81a11108af13a4bc8c6694d1da1e2c3475d5

                          SHA512

                          a3c547dae6c000a89fea69f17d2fe0a5b7103f4b98dade1d147b33697ba37cf5e449389223e5765ddd250e119282d607f8f11b11c445ea6736eba38c1cd14029

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          197KB

                          MD5

                          fa66ccb6eff6d006f57a16985c107dfd

                          SHA1

                          dba4ab5479f127fbcd220b6c947612bbaee07230

                          SHA256

                          34cdc692663d7c2bcf4ce1fe1c6c74dd1b543ed2cc0150bb36dd78fd94f4234b

                          SHA512

                          85bd4186daf5f8f600fb658d631b35e98e7beaf166aafc5bc70f6f594c535895cad73472160b6a9bc4dc672e357668c29f86bc7880aa72c5d2b977b4ad7df3dc

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • memory/2112-20-0x0000000000D80000-0x00000000018F2000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/2112-27-0x0000000008A20000-0x0000000008F4C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/2112-14-0x0000000005E60000-0x0000000005E6A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2112-15-0x0000000006F40000-0x0000000007558000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/2112-16-0x00000000061A0000-0x00000000062AA000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/2112-17-0x0000000005F40000-0x0000000005F52000-memory.dmp

                          Filesize

                          72KB

                        • memory/2112-18-0x00000000060D0000-0x000000000610C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2112-19-0x0000000006110000-0x000000000615C000-memory.dmp

                          Filesize

                          304KB

                        • memory/2112-0-0x0000000000D80000-0x00000000018F2000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/2112-21-0x00000000770F0000-0x00000000770F1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2112-22-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-23-0x0000000006A90000-0x0000000006AF6000-memory.dmp

                          Filesize

                          408KB

                        • memory/2112-24-0x00000000084A0000-0x00000000084F0000-memory.dmp

                          Filesize

                          320KB

                        • memory/2112-25-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-26-0x0000000007AC0000-0x0000000007C82000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/2112-13-0x0000000005DC0000-0x0000000005E52000-memory.dmp

                          Filesize

                          584KB

                        • memory/2112-29-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-32-0x0000000000D80000-0x00000000018F2000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/2112-33-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-12-0x0000000006370000-0x0000000006914000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2112-11-0x0000000000D80000-0x00000000018F2000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/2112-10-0x0000000000D80000-0x00000000018F2000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/2112-7-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-3-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-4-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-5-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-6-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-2-0x00000000770D0000-0x00000000771C0000-memory.dmp

                          Filesize

                          960KB

                        • memory/2112-1-0x00000000770F0000-0x00000000770F1000-memory.dmp

                          Filesize

                          4KB