Resubmissions

03-05-2022 12:57

220503-p7a1eaheaj 8

21-04-2022 08:13

220421-j4eljaacfn 8

Analysis

  • max time kernel
    44s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-04-2022 08:13

General

  • Target

    ae6a68f651c30d7c6c914114fa14aa0b.exe

  • Size

    967KB

  • MD5

    ae6a68f651c30d7c6c914114fa14aa0b

  • SHA1

    21eeaeb2061461f7bdd20f02542c18cc4ea75baa

  • SHA256

    f93628943add0691bc80e1db3cee114133ef839e820f50448b3082c46113cb6d

  • SHA512

    e06c62be260746076290d404f90e797d340db014b250d1c78bf05fc33fd469e051d9092df59f7668673cdd7a6a7df47ab5977b241b66da3ad20528c6266ddef9

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 49 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae6a68f651c30d7c6c914114fa14aa0b.exe
    "C:\Users\Admin\AppData\Local\Temp\ae6a68f651c30d7c6c914114fa14aa0b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:1952
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • outlook_office_path
      • outlook_win_path
      PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Eywuirfqiefeida.tmp

    Filesize

    3.1MB

    MD5

    1bdfa06bc0a483e11b7f79c7d2bf159b

    SHA1

    3374ea3c8f4160fb391180cef479f5592e148ecb

    SHA256

    cca21a2f2cd35d0cf026ccf5fe94801bb7b8332f37a55b9f293a2d0edfdb4862

    SHA512

    002fea0d87b0a37fde348e96ce9b1d838bd9cc327a910e491bba51c33fde56b4a67ebeb6bcec2e3e6535e0a65f24119c67119e002335373d6d2d4abde02ccf67

  • memory/776-126-0x0000000003370000-0x00000000034B0000-memory.dmp

    Filesize

    1.2MB

  • memory/776-127-0x0000000003370000-0x00000000034B0000-memory.dmp

    Filesize

    1.2MB

  • memory/776-125-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/776-124-0x0000000002900000-0x0000000003364000-memory.dmp

    Filesize

    10.4MB

  • memory/776-123-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/776-122-0x0000000002900000-0x0000000003364000-memory.dmp

    Filesize

    10.4MB

  • memory/776-121-0x0000000000240000-0x0000000000B84000-memory.dmp

    Filesize

    9.3MB

  • memory/776-119-0x0000000002900000-0x0000000003364000-memory.dmp

    Filesize

    10.4MB

  • memory/776-114-0x0000000000240000-0x0000000000B84000-memory.dmp

    Filesize

    9.3MB

  • memory/836-111-0x0000000002170000-0x0000000002171000-memory.dmp

    Filesize

    4KB

  • memory/836-109-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-55-0x0000000000220000-0x00000000002E5000-memory.dmp

    Filesize

    788KB

  • memory/836-56-0x0000000002190000-0x0000000002375000-memory.dmp

    Filesize

    1.9MB

  • memory/836-96-0x00000000029F0000-0x0000000003454000-memory.dmp

    Filesize

    10.4MB

  • memory/836-97-0x00000000029F0000-0x0000000003454000-memory.dmp

    Filesize

    10.4MB

  • memory/836-99-0x0000000003530000-0x0000000003531000-memory.dmp

    Filesize

    4KB

  • memory/836-101-0x00000000029F0000-0x0000000003454000-memory.dmp

    Filesize

    10.4MB

  • memory/836-100-0x00000000029F0000-0x0000000003454000-memory.dmp

    Filesize

    10.4MB

  • memory/836-103-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-104-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-106-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-107-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-105-0x0000000002150000-0x0000000002151000-memory.dmp

    Filesize

    4KB

  • memory/836-108-0x0000000002160000-0x0000000002161000-memory.dmp

    Filesize

    4KB

  • memory/836-57-0x0000000000400000-0x00000000005F1000-memory.dmp

    Filesize

    1.9MB

  • memory/836-110-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-113-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-112-0x00000000037B0000-0x00000000038F0000-memory.dmp

    Filesize

    1.2MB

  • memory/836-54-0x0000000000220000-0x00000000002E5000-memory.dmp

    Filesize

    788KB

  • memory/836-58-0x0000000075381000-0x0000000075383000-memory.dmp

    Filesize

    8KB

  • memory/1952-90-0x0000000000090000-0x0000000000092000-memory.dmp

    Filesize

    8KB

  • memory/1952-89-0x0000000000080000-0x0000000000082000-memory.dmp

    Filesize

    8KB

  • memory/1952-61-0x0000000000180000-0x0000000000182000-memory.dmp

    Filesize

    8KB

  • memory/1952-59-0x0000000000180000-0x0000000000182000-memory.dmp

    Filesize

    8KB

  • memory/1952-91-0x00000000000A0000-0x00000000000A2000-memory.dmp

    Filesize

    8KB

  • memory/1952-93-0x00000000000C0000-0x00000000000C2000-memory.dmp

    Filesize

    8KB

  • memory/1952-92-0x00000000000B0000-0x00000000000B2000-memory.dmp

    Filesize

    8KB

  • memory/1952-94-0x0000000000110000-0x0000000000112000-memory.dmp

    Filesize

    8KB