Analysis

  • max time kernel
    156s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 23:44

General

  • Target

    52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80.exe

  • Size

    494KB

  • MD5

    39e1b41b4118f4ea3ce2119c054b29e8

  • SHA1

    1df78a1dc0aa3382fcc6fac172b70aafd0ed8d3d

  • SHA256

    52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80

  • SHA512

    be221128a83547e0fbab70f1508704ad90dd94b22dab8ad3d502fb74f897dab5f1b4a14f9833cdb0bce7db687daa371a1a17098b4e2f438bb6953828b4684690

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 7 IoCs
  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80.exe
    "C:\Users\Admin\AppData\Local\Temp\52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Enumerates connected drives
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • outlook_win_path
    PID:1796
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {B51CDF66-22EE-4821-84D8-6CC4289DA526} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Windows\SysWOW64\ntlib.exe
      C:\Windows\SysWOW64\ntlib.exe uif
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      PID:1732

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A80156501}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A8094E303}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A80A5F801}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A80CD9101}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Windows\SysWOW64\ntlib.exe
    MD5

    d94cbd04b129943527a4a7dfed308ea3

    SHA1

    70c605497416310abd996dee73496bac9bc9590f

    SHA256

    286b1da667f1ceb5b50d353953ab0f2aea1253f4fe6b0b132b05e91ded1c4364

    SHA512

    ebfe46fe5621af14045dd4b7668af239286eab1d4dea9a6c38d2cf953c058bad70ac4158a61702fc6765b611265c9d15149542b648131c1b5a15dfa5f2dcde6c

  • C:\Windows\SysWOW64\ntlib.exe
    MD5

    d94cbd04b129943527a4a7dfed308ea3

    SHA1

    70c605497416310abd996dee73496bac9bc9590f

    SHA256

    286b1da667f1ceb5b50d353953ab0f2aea1253f4fe6b0b132b05e91ded1c4364

    SHA512

    ebfe46fe5621af14045dd4b7668af239286eab1d4dea9a6c38d2cf953c058bad70ac4158a61702fc6765b611265c9d15149542b648131c1b5a15dfa5f2dcde6c

  • memory/1732-60-0x0000000000400000-0x00000000022C2000-memory.dmp
    Filesize

    30.8MB

  • memory/1796-54-0x0000000075531000-0x0000000075533000-memory.dmp
    Filesize

    8KB

  • memory/1796-55-0x00000000086D0000-0x000000000871E000-memory.dmp
    Filesize

    312KB

  • memory/1796-56-0x0000000000400000-0x00000000022C2000-memory.dmp
    Filesize

    30.8MB