Analysis

  • max time kernel
    152s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 23:44

General

  • Target

    52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80.exe

  • Size

    494KB

  • MD5

    39e1b41b4118f4ea3ce2119c054b29e8

  • SHA1

    1df78a1dc0aa3382fcc6fac172b70aafd0ed8d3d

  • SHA256

    52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80

  • SHA512

    be221128a83547e0fbab70f1508704ad90dd94b22dab8ad3d502fb74f897dab5f1b4a14f9833cdb0bce7db687daa371a1a17098b4e2f438bb6953828b4684690

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 11 IoCs
  • Modifies data under HKEY_USERS 7 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80.exe
    "C:\Users\Admin\AppData\Local\Temp\52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Enumerates connected drives
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_win_path
    PID:3672
  • C:\Windows\SysWOW64\pptpctf.exe
    C:\Windows\SysWOW64\pptpctf.exe md3
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:3888

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A80156501}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A8094E303}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A80A5F801}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Users\Public\Documents\ntuser{4CB43D7F-7EEE-4906-8698-80BEAA2A80CD9101}.pol
    MD5

    c2034cd093335ba6a60f16a46465cb4f

    SHA1

    30ce69605bd949dcb546e5091f6592207411318b

    SHA256

    194e16917ba83662adf6538df875a7cf807bc19d04926c2a026a7eb629b29c79

    SHA512

    6d5e1dbab5f23ef07fe661c4004fd158b791796f63e68524c67cd569eb16e27ce6c1d2f91b279ccf10ca3144c55c5f14851796f6463d9b409f38b3b5e3f24742

  • C:\Windows\SysWOW64\pptpctf.exe
    MD5

    aa23771021fafb396bc8a7cc2c4e519d

    SHA1

    208cabf12cea965a9aece89b05c2a13517876354

    SHA256

    e7cfee9e1b63eaf05cc611eea93e9a4825f621144d902d6290a674502aea8837

    SHA512

    224e39dc79e71bfd9373d10117bcc62d1cae4554241b92df04592e507c3f99152bbe85992839eb4ecc4359b875f7eae7d860223fd096bac8ea084173531c526e

  • C:\Windows\SysWOW64\pptpctf.exe
    MD5

    aa23771021fafb396bc8a7cc2c4e519d

    SHA1

    208cabf12cea965a9aece89b05c2a13517876354

    SHA256

    e7cfee9e1b63eaf05cc611eea93e9a4825f621144d902d6290a674502aea8837

    SHA512

    224e39dc79e71bfd9373d10117bcc62d1cae4554241b92df04592e507c3f99152bbe85992839eb4ecc4359b875f7eae7d860223fd096bac8ea084173531c526e

  • memory/3672-117-0x0000000022F10000-0x0000000022F5E000-memory.dmp
    Filesize

    312KB

  • memory/3672-118-0x0000000000400000-0x00000000022C2000-memory.dmp
    Filesize

    30.8MB

  • memory/3888-121-0x00000000086D0000-0x000000000881A000-memory.dmp
    Filesize

    1.3MB

  • memory/3888-122-0x0000000000400000-0x00000000022C2000-memory.dmp
    Filesize

    30.8MB