Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 05:08
Behavioral task
behavioral1
Sample
4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe
Resource
win7-20240903-en
General
-
Target
4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe
-
Size
1.3MB
-
MD5
9ef0d5f043e88493283544e26ce18841
-
SHA1
9e580e1e919219811134f1460234d03b4f0e8088
-
SHA256
4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36
-
SHA512
ea47ccf9c1c977137073fab2077e4b350aecef7802b280b62c92f193824f806ca833ae73ae04f3f705e10b80b4c1121b188cf95a13e6a8092b7f9f12bb435325
-
SSDEEP
24576:Qak/7Nk4RZnmoXKZu0zoFmDcpii9iGn+66rLfJIgtEqPILWz8oDqE:Qak/qZu+k0WdEacJRIo+E
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\T: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\W: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\Z: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\H: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\M: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\N: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\O: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\P: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\Q: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\R: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\U: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\V: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\A: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\E: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\L: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\Y: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\B: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\I: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\J: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\K: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\S: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe File opened (read-only) \??\X: 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2548 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe Token: SeDebugPrivilege 2548 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe Token: SeDebugPrivilege 2604 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe Token: SeDebugPrivilege 2604 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2604 2548 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe 89 PID 2548 wrote to memory of 2604 2548 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe 89 PID 2548 wrote to memory of 2604 2548 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe 89 PID 2604 wrote to memory of 4472 2604 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe 94 PID 2604 wrote to memory of 4472 2604 4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe"C:\Users\Admin\AppData\Local\Temp\4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe"C:\Users\Admin\AppData\Local\Temp\4d72999dbe85ca1e66e766e3b793613c57d02bb3808f91cdd1ee9b337428ec36.exe" Master2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm3⤵PID:4472
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1320,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:1452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4912,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4800 /prefetch:11⤵PID:852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4716,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5208 /prefetch:11⤵PID:1824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5620,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:81⤵PID:1736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=6036,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=6060 /prefetch:11⤵PID:2100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5540,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5208 /prefetch:11⤵PID:3292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6072,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:81⤵PID:1076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=6064,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5668 /prefetch:11⤵PID:4844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6248,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=6236 /prefetch:11⤵PID:3124
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1