Analysis
-
max time kernel
150s -
max time network
190s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 22:51
Behavioral task
behavioral1
Sample
04_extracted.exe
Resource
win7v20210408
General
-
Target
04_extracted.exe
-
Size
456KB
-
MD5
58dc1cfd317058134777f77f86f62592
-
SHA1
22f19ee32e81d180be5c4e824d359456df811293
-
SHA256
12a0e61c40e9664cd768c55b50d204e038067e9dfa34c04d0170426565eb2d2c
-
SHA512
0d6984b84336c189eb590ae870b5a50ca81f3d90a7fe97ffdbfab9569b841711475054d6c1ea6e592ad9ae45e14ff70efcfd7c10effb865843a5e79b9a4be0c2
Malware Config
Signatures
-
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/768-68-0x0000000000455238-mapping.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/1332-62-0x0000000000476274-mapping.dmp WebBrowserPassView -
Nirsoft 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1332-62-0x0000000000476274-mapping.dmp Nirsoft behavioral1/memory/768-68-0x0000000000455238-mapping.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
04_extracted.exedescription pid process target process PID 1076 set thread context of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 set thread context of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 set thread context of 768 1076 04_extracted.exe 04_extracted.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
04_extracted.exepid process 1332 04_extracted.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
04_extracted.exedescription pid process Token: SeDebugPrivilege 688 04_extracted.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
04_extracted.exepid process 1076 04_extracted.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
04_extracted.exedescription pid process target process PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 1332 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 688 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe PID 1076 wrote to memory of 768 1076 04_extracted.exe 04_extracted.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04_extracted.exe"C:\Users\Admin\AppData\Local\Temp\04_extracted.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\04_extracted.exeC:\Users\Admin\AppData\Local\Temp\04_extracted.exe /stext "C:\Users\Admin\AppData\Local\Temp\dhuy"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\04_extracted.exeC:\Users\Admin\AppData\Local\Temp\04_extracted.exe /stext "C:\Users\Admin\AppData\Local\Temp\gjhqyuhw"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\04_extracted.exeC:\Users\Admin\AppData\Local\Temp\04_extracted.exe /stext "C:\Users\Admin\AppData\Local\Temp\qdmbrnspqtb"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dhuyMD5
f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
memory/688-64-0x0000000000422206-mapping.dmp
-
memory/688-63-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/688-71-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/768-67-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/768-68-0x0000000000455238-mapping.dmp
-
memory/768-72-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1076-60-0x0000000075AA1000-0x0000000075AA3000-memory.dmpFilesize
8KB
-
memory/1332-61-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1332-62-0x0000000000476274-mapping.dmp
-
memory/1332-70-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB