Resubmissions

14/04/2025, 07:51

250414-jp1kfssjz9 10

14/04/2025, 07:46

250414-jl9nyssjt9 10

08/04/2025, 15:58

250408-tevasswl18 10

08/04/2025, 14:19

250408-rm2nqsvqw2 10

Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 14:19

General

  • Target

    f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe

  • Size

    3.3MB

  • MD5

    54681d828ea105cc3603c08eb985dd5b

  • SHA1

    6958c3b1c8ab17e3e574f2ed899d02e0e97ae32d

  • SHA256

    f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8

  • SHA512

    e8f62f02e5b81f4d6384b5289ff9e358297559b92f7519a991ad14de14907adb390a014434210f759d0ee8a6290dee8c5bb9a10ec3addcf614b02f7caddd6e25

  • SSDEEP

    98304:RRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/0:Rkj8NBFwxpNOuk2H

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe
    "C:\Users\Admin\AppData\Local\Temp\f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\4hNK8J5c68qsm4.exe
      "C:\Users\Admin\AppData\Local\Temp\4hNK8J5c68qsm4.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGY5OTBkODUwZTExMWJmMzYxMTI0YTVhMjdjMjliNTYzNDUwM2YyYzhmMmM3MTBiYmYwNjkzYmQ0ZjU1N2Y1ZjguZXhl
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Windows\system32\sc.exe
          sc stop "SysMain"
          4⤵
          • Launches sc.exe
          PID:5984
        • C:\Windows\system32\sc.exe
          sc config "SysMain" start=disabled
          4⤵
          • Launches sc.exe
          PID:3724

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4hNK8J5c68qsm4.exe

    Filesize

    3.5MB

    MD5

    da666a48751d7f896c13024a6cba4e1f

    SHA1

    39bd60aef0c23d2ca11d082f9115118c0f9a1d73

    SHA256

    65ae6382087fda06f3a6f39724073f0a02f35715f11cfd5394e35e3348bbc540

    SHA512

    26fc07a73a70909f32c4708605f7251a2fb7db4949e4e91d5b2932ff1a270bdf73e56386aff9474b7bffcd9dba154fa6e5446b9327d641e9833c6d73142d26d7

  • memory/2292-37-0x00007FFB86F90000-0x00007FFB87A51000-memory.dmp

    Filesize

    10.8MB

  • memory/2292-36-0x00007FFB86F90000-0x00007FFB87A51000-memory.dmp

    Filesize

    10.8MB

  • memory/2292-34-0x000002E4B7470000-0x000002E4B74A8000-memory.dmp

    Filesize

    224KB

  • memory/2292-35-0x000002E4B6F90000-0x000002E4B6F9E000-memory.dmp

    Filesize

    56KB

  • memory/2292-33-0x000002E4B2620000-0x000002E4B2626000-memory.dmp

    Filesize

    24KB

  • memory/2292-32-0x000002E4B24F0000-0x000002E4B2562000-memory.dmp

    Filesize

    456KB

  • memory/2292-31-0x00007FFB86F90000-0x00007FFB87A51000-memory.dmp

    Filesize

    10.8MB

  • memory/2292-27-0x00007FFB86F90000-0x00007FFB87A51000-memory.dmp

    Filesize

    10.8MB

  • memory/2292-28-0x000002E4982A0000-0x000002E4985C4000-memory.dmp

    Filesize

    3.1MB

  • memory/3632-6-0x000001D91EA00000-0x000001D91EA04000-memory.dmp

    Filesize

    16KB

  • memory/3632-30-0x00007FFB86F90000-0x00007FFB87A51000-memory.dmp

    Filesize

    10.8MB

  • memory/3632-12-0x000001D93ABD0000-0x000001D93AC02000-memory.dmp

    Filesize

    200KB

  • memory/3632-13-0x000001D9203B0000-0x000001D9203B4000-memory.dmp

    Filesize

    16KB

  • memory/3632-10-0x000001D920380000-0x000001D920388000-memory.dmp

    Filesize

    32KB

  • memory/3632-9-0x000001D91EA60000-0x000001D91EA66000-memory.dmp

    Filesize

    24KB

  • memory/3632-8-0x000001D938AA0000-0x000001D938B3C000-memory.dmp

    Filesize

    624KB

  • memory/3632-11-0x000001D93AC90000-0x000001D93AD4A000-memory.dmp

    Filesize

    744KB

  • memory/3632-7-0x000001D91EA50000-0x000001D91EA56000-memory.dmp

    Filesize

    24KB

  • memory/3632-0-0x00007FFB86F93000-0x00007FFB86F95000-memory.dmp

    Filesize

    8KB

  • memory/3632-5-0x000001D93A5A0000-0x000001D93A9D8000-memory.dmp

    Filesize

    4.2MB

  • memory/3632-4-0x00007FFB86F90000-0x00007FFB87A51000-memory.dmp

    Filesize

    10.8MB

  • memory/3632-3-0x000001D91E960000-0x000001D91E990000-memory.dmp

    Filesize

    192KB

  • memory/3632-2-0x000001D938BA0000-0x000001D938E90000-memory.dmp

    Filesize

    2.9MB

  • memory/3632-1-0x000001D91E2A0000-0x000001D91E5C4000-memory.dmp

    Filesize

    3.1MB