Analysis
-
max time kernel
4294178s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
28-02-2022 03:11
Static task
static1
Behavioral task
behavioral1
Sample
c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe
Resource
win10v2004-en-20220112
General
-
Target
c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe
-
Size
1.1MB
-
MD5
29e47258c517f5f33349caacef044645
-
SHA1
42cfb37c1f47de8f1ef6f4dbd047c1a06922adc0
-
SHA256
c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e
-
SHA512
edf41423deef4dfc38d634d89e9d39c65887f168deac577c075aa4cc92bc413c611ed3d5083398d35614b425fb5c0f6ecf1b624787e8f7f16bec4d70e17a6c9f
Malware Config
Signatures
-
OutSteel batch script 1 IoCs
Detects batch script dropped by OutSteel
resource yara_rule behavioral1/files/0x0004000000004ed7-70.dat outsteel_batch_script -
Deletes itself 1 IoCs
pid Process 1612 cmd.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1152-57-0x00000000004B0000-0x00000000004D8000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\f: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\k: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\s: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\w: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\x: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\z: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\b: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\g: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\j: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\m: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\t: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\u: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\y: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\i: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\l: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\n: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\q: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\r: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\v: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\a: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\h: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\o: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe File opened (read-only) \??\p: c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/968-64-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/968-65-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/968-66-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/968-67-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/968-69-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 -
Kills process with taskkill 1 IoCs
pid Process 2016 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe Token: SeDebugPrivilege 2016 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 1152 wrote to memory of 968 1152 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 27 PID 968 wrote to memory of 1924 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 28 PID 968 wrote to memory of 1924 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 28 PID 968 wrote to memory of 1924 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 28 PID 968 wrote to memory of 1924 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 28 PID 968 wrote to memory of 1044 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 30 PID 968 wrote to memory of 1044 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 30 PID 968 wrote to memory of 1044 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 30 PID 968 wrote to memory of 1044 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 30 PID 968 wrote to memory of 1192 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 32 PID 968 wrote to memory of 1192 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 32 PID 968 wrote to memory of 1192 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 32 PID 968 wrote to memory of 1192 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 32 PID 968 wrote to memory of 1820 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 34 PID 968 wrote to memory of 1820 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 34 PID 968 wrote to memory of 1820 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 34 PID 968 wrote to memory of 1820 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 34 PID 968 wrote to memory of 1196 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 36 PID 968 wrote to memory of 1196 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 36 PID 968 wrote to memory of 1196 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 36 PID 968 wrote to memory of 1196 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 36 PID 968 wrote to memory of 1476 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 39 PID 968 wrote to memory of 1476 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 39 PID 968 wrote to memory of 1476 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 39 PID 968 wrote to memory of 1476 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 39 PID 968 wrote to memory of 2004 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 41 PID 968 wrote to memory of 2004 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 41 PID 968 wrote to memory of 2004 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 41 PID 968 wrote to memory of 2004 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 41 PID 968 wrote to memory of 836 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 44 PID 968 wrote to memory of 836 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 44 PID 968 wrote to memory of 836 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 44 PID 968 wrote to memory of 836 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 44 PID 968 wrote to memory of 840 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 46 PID 968 wrote to memory of 840 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 46 PID 968 wrote to memory of 840 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 46 PID 968 wrote to memory of 840 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 46 PID 968 wrote to memory of 1988 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 48 PID 968 wrote to memory of 1988 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 48 PID 968 wrote to memory of 1988 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 48 PID 968 wrote to memory of 1988 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 48 PID 968 wrote to memory of 1140 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 50 PID 968 wrote to memory of 1140 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 50 PID 968 wrote to memory of 1140 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 50 PID 968 wrote to memory of 1140 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 50 PID 968 wrote to memory of 1016 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 52 PID 968 wrote to memory of 1016 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 52 PID 968 wrote to memory of 1016 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 52 PID 968 wrote to memory of 1016 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 52 PID 968 wrote to memory of 1460 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 54 PID 968 wrote to memory of 1460 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 54 PID 968 wrote to memory of 1460 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 54 PID 968 wrote to memory of 1460 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 54 PID 968 wrote to memory of 436 968 c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe"C:\Users\Admin\AppData\Local\Temp\c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe"C:\Users\Admin\AppData\Local\Temp\c6c47d3d7e56213f0d0ced379c64e166ed5a86308ea96856163a4e0155b1fc6e.exe"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:1192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:1820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:1196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:2004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:1140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:1016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:1460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:1852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:1928
-
-
C:\Windows\SysWOW64\cmd.execmd /c start /min r.bat3⤵PID:1796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K r.bat4⤵
- Deletes itself
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd /min /c del "C:\Users\Admin\AppData\Local\Temp\r.bat"5⤵PID:1064
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /IM cmd.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
-
-