Overview
overview
10Static
static
101.exe
windows7_x64
61.exe
windows10-2004_x64
610.exe
windows7_x64
1010.exe
windows10-2004_x64
102.doc
windows7_x64
102.doc
windows10-2004_x64
13.xlsx
windows7_x64
103.xlsx
windows10-2004_x64
14.exe
windows7_x64
104.exe
windows10-2004_x64
15.exe
windows7_x64
105.exe
windows10-2004_x64
16.exe
windows7_x64
106.exe
windows10-2004_x64
107.exe
windows7_x64
107.exe
windows10-2004_x64
18.exe
windows7_x64
108.exe
windows10-2004_x64
109.docm
windows7_x64
109.docm
windows10-2004_x64
10rip.bat
windows7_x64
10rip.bat
windows10-2004_x64
10Analysis
-
max time kernel
4294216s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
23-03-2022 21:00
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
10.exe
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
10.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
2.doc
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
2.doc
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
3.xlsx
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
3.xlsx
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
4.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
5.exe
Resource
win7-20220310-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
6.exe
Resource
win7-20220310-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
7.exe
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
7.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral17
Sample
8.exe
Resource
win7-20220311-en
Behavioral task
behavioral18
Sample
8.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral19
Sample
9.docm
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
9.docm
Resource
win10v2004-en-20220113
Behavioral task
behavioral21
Sample
rip.bat
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
rip.bat
Resource
win10v2004-en-20220113
General
-
Target
7.exe
Malware Config
Extracted
Protocol: ftp- Host:
files.000webhost.com - Port:
21 - Username:
fcb-aws-host-4
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral15/memory/1756-57-0x0000000000411654-mapping.dmp MailPassView behavioral15/memory/1756-56-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral15/memory/1756-61-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral15/memory/372-62-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral15/memory/372-63-0x0000000000442628-mapping.dmp WebBrowserPassView behavioral15/memory/372-66-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
Processes:
resource yara_rule behavioral15/memory/1756-57-0x0000000000411654-mapping.dmp Nirsoft behavioral15/memory/1756-56-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral15/memory/1756-61-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral15/memory/372-62-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral15/memory/372-63-0x0000000000442628-mapping.dmp Nirsoft behavioral15/memory/372-66-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" 7.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 whatismyipaddress.com 6 whatismyipaddress.com 7 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7.exedescription pid process target process PID 1356 set thread context of 1756 1356 7.exe vbc.exe PID 1356 set thread context of 372 1356 7.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7.exepid process 1356 7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7.exedescription pid process Token: SeDebugPrivilege 1356 7.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
7.exedescription pid process target process PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 1756 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe PID 1356 wrote to memory of 372 1356 7.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"2⤵
- Accesses Microsoft Outlook accounts
PID:1756
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"2⤵PID:372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84