Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe

  • Size

    3.4MB

  • MD5

    e44ce2c03e5af2bc482fea32685d3fca

  • SHA1

    c87647db90bb759d7109cd47515fa4921397f1fb

  • SHA256

    488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2

  • SHA512

    764f8fb037f1a529bb54ef2cde8ee91e3afe23c2ed93e8a3796082840cc3524f2c581bd2a22cab9beca975c9442bb7729024b28e0cab7adaf58471f1a736d09e

  • SSDEEP

    98304:TRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/HW:Tkj8NBFwxpNOuk2b

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
    "C:\Users\Admin\AppData\Local\Temp\488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Users\Admin\AppData\Local\Temp\bs5xSsp9Trib.exe
      "C:\Users\Admin\AppData\Local\Temp\bs5xSsp9Trib.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXDQ4OGFlYzg1ZDQ5MDc1NGJjNDQ1ZjBlMjFlN2Q0ZDUxNDZjNzFkNTAwYmQ5NTNiODEwODYwOGQ0NGUwMzUxYjIuZXhl
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4936
        • C:\Windows\system32\sc.exe
          sc stop "SysMain"
          4⤵
          • Launches sc.exe
          PID:5020
        • C:\Windows\system32\sc.exe
          sc config "SysMain" start=disabled
          4⤵
          • Launches sc.exe
          PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bs5xSsp9Trib.exe

    Filesize

    3.2MB

    MD5

    fba10c277916b6d6991cab4d772ccdcd

    SHA1

    96db41bceaf42757b8884c480d1a3518b8ea8c2f

    SHA256

    3b961f6812ec82aefa6789d8ef81c3b4ff61f3be340aa6f163a835b73b1fa985

    SHA512

    a0a94da89f8b5d906ada9a6f808e5bfa7b748400c2a23b35fce9116043502b64598521f033b63c46e039e7e40b407ac7f85cc38a5eb2a2954dc0c175f0304b46

  • memory/3704-38-0x00007FFA45350000-0x00007FFA45E11000-memory.dmp

    Filesize

    10.8MB

  • memory/3704-37-0x00007FFA45350000-0x00007FFA45E11000-memory.dmp

    Filesize

    10.8MB

  • memory/3704-36-0x00000144782F0000-0x00000144782FE000-memory.dmp

    Filesize

    56KB

  • memory/3704-35-0x000001447ABA0000-0x000001447ABD8000-memory.dmp

    Filesize

    224KB

  • memory/3704-34-0x0000014477FA0000-0x0000014477FA6000-memory.dmp

    Filesize

    24KB

  • memory/3704-33-0x0000014477F30000-0x0000014477FA2000-memory.dmp

    Filesize

    456KB

  • memory/3704-32-0x0000014475FF0000-0x0000014476022000-memory.dmp

    Filesize

    200KB

  • memory/3704-31-0x00007FFA45350000-0x00007FFA45E11000-memory.dmp

    Filesize

    10.8MB

  • memory/3704-27-0x00007FFA45350000-0x00007FFA45E11000-memory.dmp

    Filesize

    10.8MB

  • memory/3704-28-0x0000014473E90000-0x00000144741B4000-memory.dmp

    Filesize

    3.1MB

  • memory/3836-6-0x000001F8AF0B0000-0x000001F8AF0B4000-memory.dmp

    Filesize

    16KB

  • memory/3836-8-0x000001F8C91F0000-0x000001F8C928C000-memory.dmp

    Filesize

    624KB

  • memory/3836-13-0x000001F8C9160000-0x000001F8C9164000-memory.dmp

    Filesize

    16KB

  • memory/3836-11-0x000001F8CAAF0000-0x000001F8CABAA000-memory.dmp

    Filesize

    744KB

  • memory/3836-10-0x000001F8B0A30000-0x000001F8B0A38000-memory.dmp

    Filesize

    32KB

  • memory/3836-9-0x000001F8AF100000-0x000001F8AF106000-memory.dmp

    Filesize

    24KB

  • memory/3836-30-0x00007FFA45350000-0x00007FFA45E11000-memory.dmp

    Filesize

    10.8MB

  • memory/3836-12-0x000001F8C9130000-0x000001F8C9162000-memory.dmp

    Filesize

    200KB

  • memory/3836-7-0x000001F8AF0F0000-0x000001F8AF0F6000-memory.dmp

    Filesize

    24KB

  • memory/3836-0-0x00007FFA45353000-0x00007FFA45355000-memory.dmp

    Filesize

    8KB

  • memory/3836-5-0x000001F8CA400000-0x000001F8CA838000-memory.dmp

    Filesize

    4.2MB

  • memory/3836-4-0x00007FFA45350000-0x00007FFA45E11000-memory.dmp

    Filesize

    10.8MB

  • memory/3836-3-0x000001F8AF080000-0x000001F8AF0B0000-memory.dmp

    Filesize

    192KB

  • memory/3836-2-0x000001F8C92B0000-0x000001F8C95A0000-memory.dmp

    Filesize

    2.9MB

  • memory/3836-1-0x000001F8AE9C0000-0x000001F8AECE4000-memory.dmp

    Filesize

    3.1MB