Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    23-10-2021 15:46

General

  • Target

    8b449c05d607a3e90b62b5f91118e219.exe

  • Size

    216KB

  • MD5

    8b449c05d607a3e90b62b5f91118e219

  • SHA1

    1698004fd1039142522dcd6e924df5620bae597b

  • SHA256

    b3d979fd0876b2d43950db136e955040858bbad86b047eecf937218be20a7171

  • SHA512

    00d505649b308d7275e7b5901e1224ffdae0dc9020cd4a561e29d24d020bc6e7cc7e70ab4f009c204783aa06cb6782b3dcd9d8463c20fc1fb604b14a9ea6653f

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b449c05d607a3e90b62b5f91118e219.exe
    "C:\Users\Admin\AppData\Local\Temp\8b449c05d607a3e90b62b5f91118e219.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:2684

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2684-115-0x00000000008A0000-0x00000000008A1000-memory.dmp
    Filesize

    4KB

  • memory/2684-117-0x0000000005560000-0x0000000005561000-memory.dmp
    Filesize

    4KB

  • memory/2684-118-0x0000000005220000-0x0000000005221000-memory.dmp
    Filesize

    4KB

  • memory/2684-119-0x0000000005060000-0x000000000555E000-memory.dmp
    Filesize

    5.0MB

  • memory/2684-120-0x0000000005520000-0x0000000005521000-memory.dmp
    Filesize

    4KB

  • memory/2684-121-0x0000000005DC0000-0x0000000005DC1000-memory.dmp
    Filesize

    4KB

  • memory/2684-122-0x0000000006380000-0x0000000006381000-memory.dmp
    Filesize

    4KB

  • memory/2684-123-0x0000000000F80000-0x0000000000F81000-memory.dmp
    Filesize

    4KB