Resubmissions

08/04/2025, 14:11

250408-rhjmcsvp15 10

22/03/2025, 06:18

250322-g2ywaay1fy 10

Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 14:11

General

  • Target

    f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe

  • Size

    3.3MB

  • MD5

    54681d828ea105cc3603c08eb985dd5b

  • SHA1

    6958c3b1c8ab17e3e574f2ed899d02e0e97ae32d

  • SHA256

    f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8

  • SHA512

    e8f62f02e5b81f4d6384b5289ff9e358297559b92f7519a991ad14de14907adb390a014434210f759d0ee8a6290dee8c5bb9a10ec3addcf614b02f7caddd6e25

  • SSDEEP

    98304:RRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/0:Rkj8NBFwxpNOuk2H

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe
    "C:\Users\Admin\AppData\Local\Temp\f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6036
    • C:\Users\Admin\AppData\Local\Temp\o4UuCH7nfrIhT2U.exe
      "C:\Users\Admin\AppData\Local\Temp\o4UuCH7nfrIhT2U.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGY5OTBkODUwZTExMWJmMzYxMTI0YTVhMjdjMjliNTYzNDUwM2YyYzhmMmM3MTBiYmYwNjkzYmQ0ZjU1N2Y1ZjguZXhl
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Windows\system32\sc.exe
          sc stop "SysMain"
          4⤵
          • Launches sc.exe
          PID:2540
        • C:\Windows\system32\sc.exe
          sc config "SysMain" start=disabled
          4⤵
          • Launches sc.exe
          PID:3712

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\o4UuCH7nfrIhT2U.exe

    Filesize

    3.6MB

    MD5

    fb044749e6520233fcf5b9f57ef753a2

    SHA1

    9c0c561d8d696f299c53a7b527f8eab1fe284f03

    SHA256

    373303fca1ceb8aa64c47e8618ef7b8c52e4f6c4891b58607be5e5fecfa50e0e

    SHA512

    0d9add6532c6ffb084016f34d6f3577bf003f9f2f2820356b5520ebc4670fba7db4d0c52f6005448fedcff815b5effdf66187c4d7a260ebb3c4e4be5cb983f8d

  • memory/4764-38-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

    Filesize

    10.8MB

  • memory/4764-37-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

    Filesize

    10.8MB

  • memory/4764-36-0x0000028D208A0000-0x0000028D208AE000-memory.dmp

    Filesize

    56KB

  • memory/4764-35-0x0000028D208E0000-0x0000028D20918000-memory.dmp

    Filesize

    224KB

  • memory/4764-34-0x0000028D1DD20000-0x0000028D1DD26000-memory.dmp

    Filesize

    24KB

  • memory/4764-33-0x0000028D1DCB0000-0x0000028D1DD22000-memory.dmp

    Filesize

    456KB

  • memory/4764-32-0x0000028D034D0000-0x0000028D03502000-memory.dmp

    Filesize

    200KB

  • memory/4764-31-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

    Filesize

    10.8MB

  • memory/4764-28-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

    Filesize

    10.8MB

  • memory/4764-27-0x0000028D01360000-0x0000028D01684000-memory.dmp

    Filesize

    3.1MB

  • memory/6036-6-0x000001E9C1AD0000-0x000001E9C1AD4000-memory.dmp

    Filesize

    16KB

  • memory/6036-8-0x000001E9DDCA0000-0x000001E9DDD3C000-memory.dmp

    Filesize

    624KB

  • memory/6036-13-0x000001E9DBDF0000-0x000001E9DBDF4000-memory.dmp

    Filesize

    16KB

  • memory/6036-11-0x000001E9DDE00000-0x000001E9DDEBA000-memory.dmp

    Filesize

    744KB

  • memory/6036-10-0x000001E9C33B0000-0x000001E9C33B8000-memory.dmp

    Filesize

    32KB

  • memory/6036-9-0x000001E9C3390000-0x000001E9C3396000-memory.dmp

    Filesize

    24KB

  • memory/6036-30-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

    Filesize

    10.8MB

  • memory/6036-12-0x000001E9DBDC0000-0x000001E9DBDF2000-memory.dmp

    Filesize

    200KB

  • memory/6036-7-0x000001E9C3380000-0x000001E9C3386000-memory.dmp

    Filesize

    24KB

  • memory/6036-0-0x00007FFD7B2D3000-0x00007FFD7B2D5000-memory.dmp

    Filesize

    8KB

  • memory/6036-5-0x000001E9DD860000-0x000001E9DDC98000-memory.dmp

    Filesize

    4.2MB

  • memory/6036-4-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

    Filesize

    10.8MB

  • memory/6036-3-0x000001E9C1AA0000-0x000001E9C1AD0000-memory.dmp

    Filesize

    192KB

  • memory/6036-2-0x000001E9DBE60000-0x000001E9DC150000-memory.dmp

    Filesize

    2.9MB

  • memory/6036-1-0x000001E9C13E0000-0x000001E9C1704000-memory.dmp

    Filesize

    3.1MB