Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    fbd98903f85840f90b218843df6be111339b24f98ff354743d374c8a359ca6bc.exe

  • Size

    3.3MB

  • MD5

    931086827557928414c989f9fe3e8026

  • SHA1

    e2f7b5eaf7690965351425775bce2ac1dcff2991

  • SHA256

    fbd98903f85840f90b218843df6be111339b24f98ff354743d374c8a359ca6bc

  • SHA512

    a9397a2a8a09c4f7075cac8179291c745f9ef71e9ea0c11912ff26267acf17a9ec9f0867d561c790ef78de8fccb93fd8588a5b3b7cae94a7edc7efa9ac76f27e

  • SSDEEP

    98304:mRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/vWd:mkj8NBFwxpNOuk24Wd

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbd98903f85840f90b218843df6be111339b24f98ff354743d374c8a359ca6bc.exe
    "C:\Users\Admin\AppData\Local\Temp\fbd98903f85840f90b218843df6be111339b24f98ff354743d374c8a359ca6bc.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Users\Admin\AppData\Local\Temp\3589lO1M03SsR.exe
      "C:\Users\Admin\AppData\Local\Temp\3589lO1M03SsR.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGZiZDk4OTAzZjg1ODQwZjkwYjIxODg0M2RmNmJlMTExMzM5YjI0Zjk4ZmYzNTQ3NDNkMzc0YzhhMzU5Y2E2YmMuZXhl
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Windows\system32\sc.exe
          sc stop "SysMain"
          4⤵
          • Launches sc.exe
          PID:5704
        • C:\Windows\system32\sc.exe
          sc config "SysMain" start=disabled
          4⤵
          • Launches sc.exe
          PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3589lO1M03SsR.exe

    Filesize

    3.6MB

    MD5

    6056f5f6915430baa03601e080ca93d3

    SHA1

    8a1567edd2c3482159002debb21bc7f244d148e2

    SHA256

    f1e94ed48a07cd337d59b7e13d49bf23f3eeb17b18a62fa61705c4cca471bd06

    SHA512

    67c5ae92f09291de8f8c26c7470bbea31450396a4f3b5a21752f0d039e2424b84cccf80bfb23ac22bfb31a5b94deb93c8f341eb1926324ae30155e21be37e25f

  • memory/768-37-0x00007FF9B00B0000-0x00007FF9B0B71000-memory.dmp

    Filesize

    10.8MB

  • memory/768-36-0x00007FF9B00B0000-0x00007FF9B0B71000-memory.dmp

    Filesize

    10.8MB

  • memory/768-34-0x000002F6FBF60000-0x000002F6FBF98000-memory.dmp

    Filesize

    224KB

  • memory/768-35-0x000002F6F9830000-0x000002F6F983E000-memory.dmp

    Filesize

    56KB

  • memory/768-33-0x000002F6F7300000-0x000002F6F7306000-memory.dmp

    Filesize

    24KB

  • memory/768-32-0x000002F6F9320000-0x000002F6F9392000-memory.dmp

    Filesize

    456KB

  • memory/768-31-0x00007FF9B00B0000-0x00007FF9B0B71000-memory.dmp

    Filesize

    10.8MB

  • memory/768-27-0x000002F6DC9C0000-0x000002F6DCCE4000-memory.dmp

    Filesize

    3.1MB

  • memory/768-28-0x00007FF9B00B0000-0x00007FF9B0B71000-memory.dmp

    Filesize

    10.8MB

  • memory/3512-6-0x00000195E6F00000-0x00000195E6F04000-memory.dmp

    Filesize

    16KB

  • memory/3512-30-0x00007FF9B00B0000-0x00007FF9B0B71000-memory.dmp

    Filesize

    10.8MB

  • memory/3512-13-0x00000195E8980000-0x00000195E8984000-memory.dmp

    Filesize

    16KB

  • memory/3512-12-0x00000195E8950000-0x00000195E8982000-memory.dmp

    Filesize

    200KB

  • memory/3512-11-0x00000195EB200000-0x00000195EB2BA000-memory.dmp

    Filesize

    744KB

  • memory/3512-9-0x00000195E6FB0000-0x00000195E6FB6000-memory.dmp

    Filesize

    24KB

  • memory/3512-8-0x00000195EB0A0000-0x00000195EB13C000-memory.dmp

    Filesize

    624KB

  • memory/3512-10-0x00000195E7170000-0x00000195E7178000-memory.dmp

    Filesize

    32KB

  • memory/3512-7-0x00000195E6F40000-0x00000195E6F46000-memory.dmp

    Filesize

    24KB

  • memory/3512-0-0x00007FF9B00B3000-0x00007FF9B00B5000-memory.dmp

    Filesize

    8KB

  • memory/3512-5-0x00000195EAA70000-0x00000195EAEA8000-memory.dmp

    Filesize

    4.2MB

  • memory/3512-3-0x00000195E6ED0000-0x00000195E6F00000-memory.dmp

    Filesize

    192KB

  • memory/3512-4-0x00007FF9B00B0000-0x00007FF9B0B71000-memory.dmp

    Filesize

    10.8MB

  • memory/3512-2-0x00000195E9070000-0x00000195E9360000-memory.dmp

    Filesize

    2.9MB

  • memory/3512-1-0x00000195E6820000-0x00000195E6B44000-memory.dmp

    Filesize

    3.1MB