Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-09-2021 16:43
Static task
static1
Behavioral task
behavioral1
Sample
newbin.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
newbin.exe
Resource
win10-en-20210920
General
-
Target
newbin.exe
-
Size
364KB
-
MD5
79a97d24433615837251fe141b7174d4
-
SHA1
6629ebd021eefece2411f6253e2d0b2c7a04d577
-
SHA256
7603f8e827ab78d5ff15be1b04b9a02821edf3bf90475295e0c7c792bc328f63
-
SHA512
8906e0699dfa6d71e21896d1b2c72450b78b49c8d2ea6290f00676a632c3ba703817a43b9fef50e6e9838bf176848d146646bdfdbb1dfc63c43b55f36a8f75e8
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
suricata: ET MALWARE a310Logger Stealer Exfil (SMTP)
suricata: ET MALWARE a310Logger Stealer Exfil (SMTP)
-
A310logger Executable 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab9a-118.dat a310logger behavioral2/files/0x000500000001ab9a-119.dat a310logger -
Executes dropped EXE 1 IoCs
pid Process 2752 Fox.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2468 newbin.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2752 2468 newbin.exe 70 PID 2468 wrote to memory of 2752 2468 newbin.exe 70 PID 2468 wrote to memory of 3808 2468 newbin.exe 71 PID 2468 wrote to memory of 3808 2468 newbin.exe 71 PID 2468 wrote to memory of 3808 2468 newbin.exe 71 PID 3808 wrote to memory of 3764 3808 WinMail.exe 72 PID 3808 wrote to memory of 3764 3808 WinMail.exe 72 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\newbin.exe"C:\Users\Admin\AppData\Local\Temp\newbin.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2752
-
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail" OCInstallUserConfigOE2⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE3⤵PID:3764
-
-