Analysis

  • max time kernel
    147s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 17:13

General

  • Target

    app-11.4.0/Open AI Sora 4.0 Verison 4.89.exe

  • Size

    717.9MB

  • MD5

    4ca74930fb928138ef72335d06cc39db

  • SHA1

    14ea9754494af1beb429224911b2ec2f43d3a802

  • SHA256

    86f1e1adb0542298fede2316612d6a90ab655a2774d5bc766c4eb77e0bd25e70

  • SHA512

    7aaa890c51d012eced7d1f565b61a9d3dc2480945e4ef1509806763cd48fa016ee4c9c44bde44bc10da34b00aee3e897038f200b19b9e136cb98788a6977bee2

  • SSDEEP

    3145728:lnOvz6yqIkFIkFIkFIkFIkFIkFIkFIkYZzwJgFos:eGIkFIkFIkFIkFIkFIkFIkFIk5m6s

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\app-11.4.0\Open AI Sora 4.0 Verison 4.89.exe
    "C:\Users\Admin\AppData\Local\Temp\app-11.4.0\Open AI Sora 4.0 Verison 4.89.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "msedge"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3516
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2856
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Stop-Process -Name "firefox"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2812
    • C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe
      "C:\Users\Admin\AppData\Local\Public Program\Chrome Service.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    def65711d78669d7f8e69313be4acf2e

    SHA1

    6522ebf1de09eeb981e270bd95114bc69a49cda6

    SHA256

    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

    SHA512

    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    b015b512ade3e681649a9d4d3e5a6ebb

    SHA1

    9dc07c730c4f7080e10f59ef2369bb7333b4bb9a

    SHA256

    be2a6cbe8f82da39e827f1662c28b6ac09f8eddecdf86a25c34a231fc0b4d2bb

    SHA512

    f210b415a004550058bdadb22c3360248238271ef59d655a34a57b67205e6baa29467a3937595cb2a30874e50a51650e8c352ac7b4f1a51cc55677b4b4289bbf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    057788610fc668ec68273f0a943afd10

    SHA1

    ce096a47e88db34a76bbe94a9c89482258308ad2

    SHA256

    4655d833993a7280ed1977dea9bed6005d1f5b7ed0cf1a60ca5678d86aab3961

    SHA512

    417db9008c92515f3908dcc3fc406f293198dc65fa50abc3dce806d122d98ba4d60a0f8436389e04b279cee69c9227b3b69bbb429484eca1b431d987b83cd782

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_znzj0bg3.wap.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2856-190-0x00000000056F0000-0x0000000005A44000-memory.dmp

    Filesize

    3.3MB

  • memory/2856-193-0x0000000073960000-0x0000000074110000-memory.dmp

    Filesize

    7.7MB

  • memory/2856-180-0x0000000073960000-0x0000000074110000-memory.dmp

    Filesize

    7.7MB

  • memory/3516-162-0x0000000006350000-0x000000000639C000-memory.dmp

    Filesize

    304KB

  • memory/3516-160-0x0000000005D80000-0x00000000060D4000-memory.dmp

    Filesize

    3.3MB

  • memory/3516-165-0x0000000006870000-0x0000000006892000-memory.dmp

    Filesize

    136KB

  • memory/3516-164-0x0000000006820000-0x000000000683A000-memory.dmp

    Filesize

    104KB

  • memory/3516-163-0x00000000068A0000-0x0000000006936000-memory.dmp

    Filesize

    600KB

  • memory/3516-169-0x0000000073960000-0x0000000074110000-memory.dmp

    Filesize

    7.7MB

  • memory/3516-161-0x0000000006310000-0x000000000632E000-memory.dmp

    Filesize

    120KB

  • memory/3516-166-0x00000000078A0000-0x0000000007E44000-memory.dmp

    Filesize

    5.6MB

  • memory/3516-143-0x000000007396E000-0x000000007396F000-memory.dmp

    Filesize

    4KB

  • memory/3516-149-0x0000000005C30000-0x0000000005C96000-memory.dmp

    Filesize

    408KB

  • memory/3516-150-0x0000000005D10000-0x0000000005D76000-memory.dmp

    Filesize

    408KB

  • memory/3516-148-0x0000000005A90000-0x0000000005AB2000-memory.dmp

    Filesize

    136KB

  • memory/3516-147-0x0000000073960000-0x0000000074110000-memory.dmp

    Filesize

    7.7MB

  • memory/3516-146-0x0000000005430000-0x0000000005A58000-memory.dmp

    Filesize

    6.2MB

  • memory/3516-145-0x0000000073960000-0x0000000074110000-memory.dmp

    Filesize

    7.7MB

  • memory/3516-144-0x0000000002A00000-0x0000000002A36000-memory.dmp

    Filesize

    216KB

  • memory/4284-53-0x000000002E260000-0x000000002E2DA000-memory.dmp

    Filesize

    488KB

  • memory/4284-49-0x000000002E310000-0x000000002E3A6000-memory.dmp

    Filesize

    600KB

  • memory/4284-29-0x000000002E050000-0x000000002E0F5000-memory.dmp

    Filesize

    660KB

  • memory/4284-28-0x000000002E3B0000-0x000000002E706000-memory.dmp

    Filesize

    3.3MB

  • memory/4284-21-0x0000000006EB0000-0x0000000006EE0000-memory.dmp

    Filesize

    192KB

  • memory/4284-64-0x000000002E710000-0x000000002E722000-memory.dmp

    Filesize

    72KB

  • memory/4284-61-0x000000002E710000-0x000000002E722000-memory.dmp

    Filesize

    72KB

  • memory/4284-20-0x000000002DEC0000-0x000000002E04E000-memory.dmp

    Filesize

    1.6MB

  • memory/4284-32-0x000000002E050000-0x000000002E0F5000-memory.dmp

    Filesize

    660KB

  • memory/4284-25-0x000000002E3B0000-0x000000002E706000-memory.dmp

    Filesize

    3.3MB

  • memory/4284-36-0x0000000006F10000-0x0000000006F25000-memory.dmp

    Filesize

    84KB

  • memory/4284-37-0x000000002DE30000-0x000000002DE41000-memory.dmp

    Filesize

    68KB

  • memory/4284-40-0x000000002DE30000-0x000000002DE41000-memory.dmp

    Filesize

    68KB

  • memory/4284-41-0x000000002E180000-0x000000002E1F5000-memory.dmp

    Filesize

    468KB

  • memory/4284-44-0x000000002E180000-0x000000002E1F5000-memory.dmp

    Filesize

    468KB

  • memory/4284-45-0x000000002E200000-0x000000002E254000-memory.dmp

    Filesize

    336KB

  • memory/4284-48-0x000000002E200000-0x000000002E254000-memory.dmp

    Filesize

    336KB

  • memory/4284-33-0x0000000006F10000-0x0000000006F25000-memory.dmp

    Filesize

    84KB

  • memory/4284-52-0x000000002E310000-0x000000002E3A6000-memory.dmp

    Filesize

    600KB

  • memory/4284-1-0x0000000006F40000-0x00000000078C9000-memory.dmp

    Filesize

    9.5MB

  • memory/4284-56-0x000000002E260000-0x000000002E2DA000-memory.dmp

    Filesize

    488KB

  • memory/4284-60-0x000000002E100000-0x000000002E13C000-memory.dmp

    Filesize

    240KB

  • memory/4284-57-0x000000002E100000-0x000000002E13C000-memory.dmp

    Filesize

    240KB

  • memory/4284-24-0x0000000006EB0000-0x0000000006EE0000-memory.dmp

    Filesize

    192KB

  • memory/4284-17-0x000000002DEC0000-0x000000002E04E000-memory.dmp

    Filesize

    1.6MB

  • memory/4284-9-0x0000000006A30000-0x0000000006A4D000-memory.dmp

    Filesize

    116KB

  • memory/4284-13-0x0000000006A80000-0x0000000006AA8000-memory.dmp

    Filesize

    160KB

  • memory/4284-16-0x0000000006A80000-0x0000000006AA8000-memory.dmp

    Filesize

    160KB

  • memory/4284-12-0x0000000006A30000-0x0000000006A4D000-memory.dmp

    Filesize

    116KB

  • memory/4284-8-0x00000000068F0000-0x0000000006997000-memory.dmp

    Filesize

    668KB

  • memory/4284-5-0x00000000068F0000-0x0000000006997000-memory.dmp

    Filesize

    668KB

  • memory/4284-4-0x0000000000734000-0x0000000000735000-memory.dmp

    Filesize

    4KB

  • memory/4284-3-0x0000000006F40000-0x00000000078C9000-memory.dmp

    Filesize

    9.5MB