Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 15:03
Behavioral task
behavioral1
Sample
OkEgjVmQ0rPYTjBDwBy70NyH.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
OkEgjVmQ0rPYTjBDwBy70NyH.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Osz8mRDYP0laXozOTuxyUiiF.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Osz8mRDYP0laXozOTuxyUiiF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
rUtfalBbvXy6eEmMrseqpFHx.exe
Resource
win7-20240903-en
General
-
Target
OkEgjVmQ0rPYTjBDwBy70NyH.exe
-
Size
1.8MB
-
MD5
53074ccaf36bc24fd4286062f0cdac98
-
SHA1
2ca97c4d5dfacfc29d8feee90cd7de2eff651225
-
SHA256
d654c6c1643997b6c6d8e8133e867e52c3176f3e6ed3827ea5f4e29023817115
-
SHA512
4a47f2fad7dcf2fefb8fd4ed2714b90f13b4cfec755521db27fb131fce068168f31e1edb0d2dc7f5eb867f992063a37ce5022e7a8a894f906fc91ed1c1be6ef5
-
SSDEEP
49152:78492ViONKb0EK/vxtzuViYcqePo2GJKFg8764CTaCowwvgv:7fDuZDHr6ctUKFj764CTa1wggv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation OkEgjVmQ0rPYTjBDwBy70NyH.exe -
Executes dropped EXE 1 IoCs
pid Process 524 se.exe -
Loads dropped DLL 4 IoCs
pid Process 524 se.exe 524 se.exe 524 se.exe 524 se.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 524 se.exe 524 se.exe 524 se.exe 524 se.exe 524 se.exe 524 se.exe 524 se.exe 524 se.exe 524 se.exe 524 se.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OkEgjVmQ0rPYTjBDwBy70NyH.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 880 wrote to memory of 524 880 OkEgjVmQ0rPYTjBDwBy70NyH.exe 84 PID 880 wrote to memory of 524 880 OkEgjVmQ0rPYTjBDwBy70NyH.exe 84 PID 524 wrote to memory of 4848 524 se.exe 86 PID 524 wrote to memory of 4848 524 se.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\OkEgjVmQ0rPYTjBDwBy70NyH.exe"C:\Users\Admin\AppData\Local\Temp\OkEgjVmQ0rPYTjBDwBy70NyH.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\se.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\se.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SYSTEM32\cmd.execmd /c copy /Y C:\Users\Admin\AppData\Local\Google\Chrome\"User Data"\Default\Network\Cookies C:\Users\Admin\AppData\Local\Google\Chrome\"User Data"\Default\Cookies3⤵PID:4848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5c7a693fcffcb6c245282d1132e38ac5b
SHA18965f69c938eecb2226ad7329a9df5109d93cb8c
SHA256a8102891d06b5f21c35c67e4ab26eb84f54405b67e67eaf75dadc62cef08b55a
SHA512321456ae04eb392734a0aba27e965500467d58dc1277fc550b6573916607ba53c686db05219ce326fb3f9289cc4430b85990362f630e4a7829345067986ca6d2
-
Filesize
36KB
MD5d76532f224b6648179b77525326e8754
SHA1cb0a90adf84b9c19e750b166789452693f031053
SHA2560d8217dbb0d52a3f8cd233b089131ca19aa6e0fc0c0fb10081f3c50761f5d15e
SHA512721b4f0f55fbeefa394d3471c66d32e2f0f452f9977987450b1662b8e2e9a88d1b9c014b5f2a4b378d99f6fe4de6b5810f8b00157ae25b0de2a3bf3e211ea2fc
-
Filesize
10B
MD50baa1de3318d435d5526a5e52b25781f
SHA10980b54b754816d311c96cc8f6ea37484e740958
SHA256fc6094f4a447b5ee0615ff35f1193237e4f13f0d678f86027f0ddab2e48dfbb0
SHA512d2d98859345dcfaa7a6a8b709558f4348adb8b2ea356e4126c67a98be5fc80fac3e8d2e592241b048b0be60d8ca2195a72ab21c88697727796a6d460e7fdcd43
-
Filesize
1.7MB
MD57571ef964723c0fcb4d49c0d91e84be3
SHA1a748b97e1e22cfeca1f1a18ed27b6bfc445648f7
SHA25645dd69c56eb90b6a8fb9663d0f86c16bf3dd2eaa9e15119db8dca75247f150c3
SHA512ba4fb0f9494d5ded543779ca3c2adb4be352a4f813c7287e8e35133a20a3bb80eae1ef91a64517bb83ddc17d1c9ac6aae7ba352cb708ff7975a8e87ee52b8cc5
-
Filesize
94KB
MD56e34fc4a713c3fbd88e47ac188d2540d
SHA11877a17da406d147566168c56aac1eb576782b37
SHA256d8faf8ebf360ed0b3b1a43877a04863f7e044b3d19b641d88737e0829d683b36
SHA512848a1d9602210d7da0f6e4d7817af08dc02baac7eccf1cfaadaf3a24b55e1316e77c40672a6a1195797e525f448817e534ae200e99cdf548ee64a7996fbcec4f