Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 00:22

General

  • Target

    94c66301ab6fdec5629f959863dbf9cc5ca1f81b00c173a0017fa5ba3aee6b03.exe

  • Size

    5.8MB

  • MD5

    6d6bb922a210e712b996824df9c340f2

  • SHA1

    fe93c4ccc29144b4f0cb0c9734eb00dbbdf5c5c0

  • SHA256

    94c66301ab6fdec5629f959863dbf9cc5ca1f81b00c173a0017fa5ba3aee6b03

  • SHA512

    33ea02cc143e5578e90c114282b9472c623c67a43bb2bc0c4ad0d6dabb8ae9e8169e1e52629689844ce5c644f7af6f068284622cd4b5613d01b887eb39a684fd

  • SSDEEP

    98304:Odix1DBHi52kgkPaP4t18frP3wbzWFimaI7dlot3:YUHi52k5MgbzWFimaI7dle

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 6 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 6 IoCs
  • UPX dump on OEP (original entry point) 6 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies registry class 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\94c66301ab6fdec5629f959863dbf9cc5ca1f81b00c173a0017fa5ba3aee6b03.exe
    "C:\Users\Admin\AppData\Local\Temp\94c66301ab6fdec5629f959863dbf9cc5ca1f81b00c173a0017fa5ba3aee6b03.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMShellExt64.dll"
      2⤵
        PID:3596
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
          3⤵
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2984.0.606387771\1671932625" -parentBuildID 20230214051806 -prefsHandle 1788 -prefMapHandle 1780 -prefsLen 22244 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60756754-aea3-4e41-9a8b-341daaf5e29e} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" 1868 2306a8fbc58 gpu
            4⤵
              PID:1300
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2984.1.514883396\204675761" -parentBuildID 20230214051806 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 23095 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d6803b8-9a6f-4ba5-8c05-3951a4505889} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" 2460 23057588d58 socket
              4⤵
                PID:4800
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2984.2.986187268\73139141" -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3000 -prefsLen 23133 -prefMapSize 235121 -jsInitHandle 900 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {664eb2d9-6b40-48f2-9308-02d39f19e369} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" 3016 2306e924558 tab
                4⤵
                  PID:2076
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2984.3.948640827\1185424327" -childID 2 -isForBrowser -prefsHandle 3864 -prefMapHandle 3860 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 900 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18f0f760-65f1-48c5-b05e-2fcfc562223d} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" 3876 2305757ae58 tab
                  4⤵
                    PID:3000
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2984.4.456918046\557017447" -childID 3 -isForBrowser -prefsHandle 5032 -prefMapHandle 5028 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 900 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b704a643-68eb-49f9-b841-da4b932ab9b7} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" 4800 230720b1a58 tab
                    4⤵
                      PID:428
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2984.5.66826116\630849115" -childID 4 -isForBrowser -prefsHandle 5164 -prefMapHandle 5172 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 900 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4a56e5a-2b8e-4c50-9e70-9963a8692ea7} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" 5156 230720b2058 tab
                      4⤵
                        PID:4548
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2984.6.1567390405\1921124618" -childID 5 -isForBrowser -prefsHandle 5356 -prefMapHandle 5360 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 900 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb91ee46-3ff4-41fb-9a28-caa4dee97f07} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" 5344 230720b3e58 tab
                        4⤵
                          PID:2396
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMShellExt64.dll"
                      2⤵
                        PID:3348
                      • C:\Windows\SysWOW64\regsvr32.exe
                        "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMIECC64.dll"
                        2⤵
                          PID:4488
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMGetAll64.dll"
                          2⤵
                            PID:388
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\downlWithIDM64.dll"
                            2⤵
                              PID:5004

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Persistence

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Browser Extensions

                          1
                          T1176

                          Privilege Escalation

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Defense Evasion

                          Modify Registry

                          3
                          T1112

                          Credential Access

                          Unsecured Credentials

                          1
                          T1552

                          Credentials In Files

                          1
                          T1552.001

                          Discovery

                          Query Registry

                          4
                          T1012

                          System Information Discovery

                          4
                          T1082

                          Peripheral Device Discovery

                          1
                          T1120

                          Collection

                          Data from Local System

                          1
                          T1005

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files\Common Files\System\symsrv.dll
                            Filesize

                            67KB

                            MD5

                            7574cf2c64f35161ab1292e2f532aabf

                            SHA1

                            14ba3fa927a06224dfe587014299e834def4644f

                            SHA256

                            de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

                            SHA512

                            4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\e6zhegwu.default-release\activity-stream.discovery_stream.json.tmp
                            Filesize

                            26KB

                            MD5

                            003473f5b1310023c548a6f38d1e2483

                            SHA1

                            c5c8bcbf9acc2629039b95aa5f076b7dcee2dca5

                            SHA256

                            7b5344691fa369a19fe21fad4755c11e09c8823f7deed6528f30597fecbc9b93

                            SHA512

                            a47a7dbd4670c5ba88d875c74e8ef2050c7cf0580bcbf80ae91fbb69a109312088d4fb8b12a616d48eaa6bef3a50245bc59c4de16fa51373c4ef7d25665d9963

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e6zhegwu.default-release\prefs-1.js
                            Filesize

                            7KB

                            MD5

                            5e1c69f134936c9af9fb23ee36681dea

                            SHA1

                            22fd3bba773c88363d8a7caf6e8f81c4be75642e

                            SHA256

                            cbc4c840421c201eabc98bedec82a3295f1e6c0a4ae58fee885deecd2be80dcb

                            SHA512

                            f139f806c295135f2df6c5d808927a78141372fa9da2ae5588e88d5c1430582989781698b602a008960d40b8744b5bc45012aa82b9af973fb7330d7d370d0fca

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e6zhegwu.default-release\prefs-1.js
                            Filesize

                            7KB

                            MD5

                            4f2cc640dc479646ae8bf0f0e166cbb2

                            SHA1

                            a560a2a690caf60714cd5caadd2deb6b6d82b84c

                            SHA256

                            ea4b6cb69b1153e5b218474a5b2b02325dfd117699694dc91b652652c29b2e90

                            SHA512

                            c71e747d5fa0558f2f0e28c384fb1e5dbf4d55a383ef7e09a5e43b4ba333184d3329b444b259f8f9ac0e9a188b54581be54bebb85afea11bdcb6950f43eecc0b

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e6zhegwu.default-release\prefs.js
                            Filesize

                            6KB

                            MD5

                            2c1085d62f62c2d0d783efeeaae0f5b0

                            SHA1

                            62021c0a1429d222ff31ffa70955e2cc965bcac7

                            SHA256

                            f4a894a905f425f22f7ee3fa57310be4d1a8c0ade322375ede56a0371d8fc4d8

                            SHA512

                            7ad4bbc8a20a5213a254a59d41ae06943179fef31c6c50fc72b3cb22fd9aac70d8a8e3e9195dd801a6f8551e728a8aae7f7bc29c927816512420d49ef5045b04

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e6zhegwu.default-release\sessionstore-backups\recovery.jsonlz4
                            Filesize

                            1KB

                            MD5

                            ad29f98b2ea715b4553a2e3bc3ca4b57

                            SHA1

                            edb8849242824bd472a5fccff9f48b726886c850

                            SHA256

                            09efbaed2cbe07eaf9170c01602dccd767afb2f5cdc820d288a9fbd31822f48f

                            SHA512

                            8079370dc9cc92dbfdb438dbb07cda979d4ced27bb8559239964ae388c8ef458b234b3afb4d218f85d2c9007fafe7b06c2daf5a203bdcbf2751ff9bdbbc0b1a1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e6zhegwu.default-release\sessionstore-backups\recovery.jsonlz4
                            Filesize

                            1KB

                            MD5

                            e20fc333930ef4aef73dba80c09f188c

                            SHA1

                            c61f8eb927afa56a5fb1a02861b0572e0a85cd7f

                            SHA256

                            02626d6e922ba5a700ef701c8095508efcf62a6ae6309d23da68b96ecc31fa58

                            SHA512

                            da42fdcb10a970fd528402ea28f13b4d06479d25849894e50b8887a6e2f18fa6ccaed4912eeb36eb3dfbc1bca31f92efe83ec3acd5bd900ddbf3b26841aee22a

                          • memory/1916-98-0x0000000000F30000-0x00000000014F8000-memory.dmp
                            Filesize

                            5.8MB

                          • memory/1916-10-0x0000000010000000-0x0000000010030000-memory.dmp
                            Filesize

                            192KB

                          • memory/1916-96-0x0000000010000000-0x0000000010030000-memory.dmp
                            Filesize

                            192KB

                          • memory/1916-95-0x0000000000F30000-0x00000000014F8000-memory.dmp
                            Filesize

                            5.8MB

                          • memory/1916-9-0x0000000000F30000-0x00000000014F8000-memory.dmp
                            Filesize

                            5.8MB

                          • memory/1916-3-0x0000000010000000-0x0000000010030000-memory.dmp
                            Filesize

                            192KB

                          • memory/1916-55-0x0000000010000000-0x0000000010030000-memory.dmp
                            Filesize

                            192KB

                          • memory/1916-126-0x0000000010000000-0x0000000010030000-memory.dmp
                            Filesize

                            192KB

                          • memory/1916-154-0x0000000000F30000-0x00000000014F8000-memory.dmp
                            Filesize

                            5.8MB

                          • memory/1916-156-0x0000000000F30000-0x00000000014F8000-memory.dmp
                            Filesize

                            5.8MB

                          • memory/1916-163-0x0000000000F30000-0x00000000014F8000-memory.dmp
                            Filesize

                            5.8MB