Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:12

General

  • Target

    67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e.exe

  • Size

    3.4MB

  • MD5

    465dbd72a357767abad74e20eb2c1d96

  • SHA1

    b76518e1ee07d968e3888371fd58327b9593c7f0

  • SHA256

    67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e

  • SHA512

    f6622aabec3290ca2bf483f8a07e930179bb5dbd4aeeb8f9b96debe543885fef8d4b7ad8cdc8ccab0231e7f50c68bc42dd301b9ba0007bcd2dee5b21878da246

  • SSDEEP

    98304:ZRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/HK/:Zkj8NBFwxpNOuk2MK/

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e.exe
    "C:\Users\Admin\AppData\Local\Temp\67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Users\Admin\AppData\Local\Temp\c49IcRWb4P7.exe
      "C:\Users\Admin\AppData\Local\Temp\c49IcRWb4P7.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXDY3ZTc4ZGEyM2UwOWFlNTA0MjAwZTEwN2Y4YmQ5YzYwMDgxMjAzMTIwZmQ5ZjdhYmI1NjY5NmM1NTJkYzUyMGUuZXhl
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\system32\sc.exe
          sc stop "SysMain"
          4⤵
          • Launches sc.exe
          PID:3640
        • C:\Windows\system32\sc.exe
          sc config "SysMain" start=disabled
          4⤵
          • Launches sc.exe
          PID:4960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c49IcRWb4P7.exe

    Filesize

    3.3MB

    MD5

    03304634be2e5dae870b0ea189645832

    SHA1

    60a50457b4f7ccba1143684210ceea5a62c4b74a

    SHA256

    e0c4ace2123b882cf42503713022c1e0448959fd2362af146a9086f76e72587c

    SHA512

    8f715729e99a41d0db9a9b84421d9a4ce9209e493747bf43ca277021bbfa858ed526edb37eda01e5024568931d89c49c19e0ed5c557939e5bf091862ccc61bfd

  • memory/440-38-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

    Filesize

    10.8MB

  • memory/440-37-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

    Filesize

    10.8MB

  • memory/440-35-0x0000029FF2930000-0x0000029FF2968000-memory.dmp

    Filesize

    224KB

  • memory/440-36-0x0000029FF2900000-0x0000029FF290E000-memory.dmp

    Filesize

    56KB

  • memory/440-34-0x0000029FEBDB0000-0x0000029FEBDB6000-memory.dmp

    Filesize

    24KB

  • memory/440-33-0x0000029FEFD60000-0x0000029FEFDD2000-memory.dmp

    Filesize

    456KB

  • memory/440-32-0x0000029FEDCB0000-0x0000029FEDCE2000-memory.dmp

    Filesize

    200KB

  • memory/440-31-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

    Filesize

    10.8MB

  • memory/440-27-0x0000029FEB3C0000-0x0000029FEB6E4000-memory.dmp

    Filesize

    3.1MB

  • memory/440-28-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3696-6-0x000001F99EB90000-0x000001F99EB94000-memory.dmp

    Filesize

    16KB

  • memory/3696-8-0x000001F9A04C0000-0x000001F9A055C000-memory.dmp

    Filesize

    624KB

  • memory/3696-12-0x000001F9BAD80000-0x000001F9BADB2000-memory.dmp

    Filesize

    200KB

  • memory/3696-10-0x000001F99ECF0000-0x000001F99ECF8000-memory.dmp

    Filesize

    32KB

  • memory/3696-11-0x000001F9BAE40000-0x000001F9BAEFA000-memory.dmp

    Filesize

    744KB

  • memory/3696-9-0x000001F99EBF0000-0x000001F99EBF6000-memory.dmp

    Filesize

    24KB

  • memory/3696-30-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3696-13-0x000001F9BADB0000-0x000001F9BADB4000-memory.dmp

    Filesize

    16KB

  • memory/3696-7-0x000001F99EBE0000-0x000001F99EBE6000-memory.dmp

    Filesize

    24KB

  • memory/3696-1-0x000001F99E4B0000-0x000001F99E7D4000-memory.dmp

    Filesize

    3.1MB

  • memory/3696-5-0x000001F9BA750000-0x000001F9BAB88000-memory.dmp

    Filesize

    4.2MB

  • memory/3696-3-0x000001F99EB60000-0x000001F99EB90000-memory.dmp

    Filesize

    192KB

  • memory/3696-4-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3696-2-0x000001F9B8D50000-0x000001F9B9040000-memory.dmp

    Filesize

    2.9MB

  • memory/3696-0-0x00007FFAA5E13000-0x00007FFAA5E15000-memory.dmp

    Filesize

    8KB