Analysis

  • max time kernel
    147s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 21:44

General

  • Target

    app-11.4.0/Open AI Sora 4.0 Verison 4.89.exe

  • Size

    717.9MB

  • MD5

    4ca74930fb928138ef72335d06cc39db

  • SHA1

    14ea9754494af1beb429224911b2ec2f43d3a802

  • SHA256

    86f1e1adb0542298fede2316612d6a90ab655a2774d5bc766c4eb77e0bd25e70

  • SHA512

    7aaa890c51d012eced7d1f565b61a9d3dc2480945e4ef1509806763cd48fa016ee4c9c44bde44bc10da34b00aee3e897038f200b19b9e136cb98788a6977bee2

  • SSDEEP

    3145728:lnOvz6yqIkFIkFIkFIkFIkFIkFIkFIkYZzwJgFos:eGIkFIkFIkFIkFIkFIkFIkFIk5m6s

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\app-11.4.0\Open AI Sora 4.0 Verison 4.89.exe
    "C:\Users\Admin\AppData\Local\Temp\app-11.4.0\Open AI Sora 4.0 Verison 4.89.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "msedge"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3388
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3952
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    dacf7b69d0f2cf691d1000faffe696f4

    SHA1

    b5d5c4eeca92da611c1d671278327ebfabe50d5a

    SHA256

    e6526da3dfdf0ad671244ed120888369ea0963e297046bd45c982bb995e8a744

    SHA512

    3b63772d5a14a103fef627c2150c9f9f72a0476d90f9f2e12014e857df8f6513617fd35c91160dd5b75980b8cce10ecbadeca440d207ebcf52fc0e3e2dc3c768

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    f0590cae80ae688603e8894f8409cac2

    SHA1

    84868af435be768f3ff0ed043eaa8bc7db29141d

    SHA256

    bd37ae3b0fcd80dd2c1efd31d7f665d0577240c3e2b5c32d3703ae3217ae23ab

    SHA512

    ef662faa8c27cd7508b22dcf7e082c00a285acf4cb4177a91bd086b3cc31544b4bce92bca81e47f8e3d4743d67a5f0df9e424118f391dcc0ce02f7c8fa2034bf

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ncclj3to.jnp.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1512-165-0x0000000006130000-0x0000000006152000-memory.dmp

    Filesize

    136KB

  • memory/1512-162-0x0000000005C10000-0x0000000005C5C000-memory.dmp

    Filesize

    304KB

  • memory/1512-144-0x00000000022C0000-0x00000000022F6000-memory.dmp

    Filesize

    216KB

  • memory/1512-145-0x0000000073520000-0x0000000073CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/1512-146-0x0000000004E20000-0x0000000005448000-memory.dmp

    Filesize

    6.2MB

  • memory/1512-147-0x0000000073520000-0x0000000073CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/1512-169-0x0000000073520000-0x0000000073CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/1512-166-0x0000000007220000-0x00000000077C4000-memory.dmp

    Filesize

    5.6MB

  • memory/1512-143-0x000000007352E000-0x000000007352F000-memory.dmp

    Filesize

    4KB

  • memory/1512-164-0x00000000060C0000-0x00000000060DA000-memory.dmp

    Filesize

    104KB

  • memory/1512-163-0x0000000006BD0000-0x0000000006C66000-memory.dmp

    Filesize

    600KB

  • memory/1512-148-0x0000000004D40000-0x0000000004D62000-memory.dmp

    Filesize

    136KB

  • memory/1512-161-0x0000000005BF0000-0x0000000005C0E000-memory.dmp

    Filesize

    120KB

  • memory/1512-160-0x00000000055E0000-0x0000000005934000-memory.dmp

    Filesize

    3.3MB

  • memory/1512-149-0x0000000005500000-0x0000000005566000-memory.dmp

    Filesize

    408KB

  • memory/1512-150-0x0000000005570000-0x00000000055D6000-memory.dmp

    Filesize

    408KB

  • memory/3388-192-0x0000000005BB0000-0x0000000005F04000-memory.dmp

    Filesize

    3.3MB

  • memory/3388-195-0x0000000073520000-0x0000000073CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3388-180-0x0000000073520000-0x0000000073CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3388-181-0x0000000073520000-0x0000000073CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3388-182-0x0000000073520000-0x0000000073CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3952-197-0x0000000006040000-0x0000000006394000-memory.dmp

    Filesize

    3.3MB

  • memory/5028-64-0x000000002DF90000-0x000000002DFA2000-memory.dmp

    Filesize

    72KB

  • memory/5028-52-0x000000002DA70000-0x000000002DB06000-memory.dmp

    Filesize

    600KB

  • memory/5028-25-0x000000002E000000-0x000000002E356000-memory.dmp

    Filesize

    3.3MB

  • memory/5028-24-0x0000000006AC0000-0x0000000006AF0000-memory.dmp

    Filesize

    192KB

  • memory/5028-21-0x0000000006AC0000-0x0000000006AF0000-memory.dmp

    Filesize

    192KB

  • memory/5028-29-0x000000002DCA0000-0x000000002DD45000-memory.dmp

    Filesize

    660KB

  • memory/5028-17-0x000000002DB10000-0x000000002DC9E000-memory.dmp

    Filesize

    1.6MB

  • memory/5028-32-0x000000002DCA0000-0x000000002DD45000-memory.dmp

    Filesize

    660KB

  • memory/5028-33-0x0000000006B20000-0x0000000006B35000-memory.dmp

    Filesize

    84KB

  • memory/5028-36-0x0000000006B20000-0x0000000006B35000-memory.dmp

    Filesize

    84KB

  • memory/5028-37-0x000000002DA30000-0x000000002DA41000-memory.dmp

    Filesize

    68KB

  • memory/5028-40-0x000000002DA30000-0x000000002DA41000-memory.dmp

    Filesize

    68KB

  • memory/5028-41-0x000000002DD50000-0x000000002DDC5000-memory.dmp

    Filesize

    468KB

  • memory/5028-44-0x000000002DD50000-0x000000002DDC5000-memory.dmp

    Filesize

    468KB

  • memory/5028-45-0x000000002DDD0000-0x000000002DE24000-memory.dmp

    Filesize

    336KB

  • memory/5028-48-0x000000002DDD0000-0x000000002DE24000-memory.dmp

    Filesize

    336KB

  • memory/5028-49-0x000000002DA70000-0x000000002DB06000-memory.dmp

    Filesize

    600KB

  • memory/5028-28-0x000000002E000000-0x000000002E356000-memory.dmp

    Filesize

    3.3MB

  • memory/5028-61-0x000000002DF90000-0x000000002DFA2000-memory.dmp

    Filesize

    72KB

  • memory/5028-4-0x0000000000DD4000-0x0000000000DD5000-memory.dmp

    Filesize

    4KB

  • memory/5028-53-0x000000002DEB0000-0x000000002DF2A000-memory.dmp

    Filesize

    488KB

  • memory/5028-56-0x000000002DEB0000-0x000000002DF2A000-memory.dmp

    Filesize

    488KB

  • memory/5028-60-0x000000002DE70000-0x000000002DEAC000-memory.dmp

    Filesize

    240KB

  • memory/5028-57-0x000000002DE70000-0x000000002DEAC000-memory.dmp

    Filesize

    240KB

  • memory/5028-20-0x000000002DB10000-0x000000002DC9E000-memory.dmp

    Filesize

    1.6MB

  • memory/5028-5-0x00000000064C0000-0x0000000006567000-memory.dmp

    Filesize

    668KB

  • memory/5028-8-0x00000000064C0000-0x0000000006567000-memory.dmp

    Filesize

    668KB

  • memory/5028-9-0x0000000006430000-0x000000000644D000-memory.dmp

    Filesize

    116KB

  • memory/5028-13-0x0000000006480000-0x00000000064A8000-memory.dmp

    Filesize

    160KB

  • memory/5028-16-0x0000000006480000-0x00000000064A8000-memory.dmp

    Filesize

    160KB

  • memory/5028-12-0x0000000006430000-0x000000000644D000-memory.dmp

    Filesize

    116KB

  • memory/5028-3-0x0000000006B90000-0x0000000007519000-memory.dmp

    Filesize

    9.5MB

  • memory/5028-0-0x0000000006B90000-0x0000000007519000-memory.dmp

    Filesize

    9.5MB