Resubmissions

03-05-2022 13:27

220503-qp34xaabfj 8

26-04-2022 04:40

220426-fajfvabab3 8

Analysis

  • max time kernel
    113s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    26-04-2022 04:40

General

  • Target

    341d69cf4f5d9be493ebe9913f4150cf.exe

  • Size

    1.1MB

  • MD5

    341d69cf4f5d9be493ebe9913f4150cf

  • SHA1

    b043c610bf6b1fea68701910870d439501d8f832

  • SHA256

    ea315e9e65af9d1d95ac0636abde389107bb131f99e9eeac2dd16821be1ba888

  • SHA512

    50534e155760d2dde64e0737f90b63d35c1b0e3136007476d9e62b8eaf0bfb42225a57dc340c12e45a7346cdf56a857e403b4230d561b32991f1155f4d8294ab

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks processor information in registry 2 TTPs 40 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe
    "C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:4780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 600
      2⤵
      • Program crash
      PID:4788
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 868
      2⤵
      • Program crash
      PID:1032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 924
      2⤵
      • Program crash
      PID:760
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1000
      2⤵
      • Program crash
      PID:216
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • outlook_office_path
      • outlook_win_path
      PID:4980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 4460 -ip 4460
    1⤵
      PID:4496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4460 -ip 4460
      1⤵
        PID:3836
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 4460
        1⤵
          PID:1340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 4460
          1⤵
            PID:4792

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          2
          T1082

          Collection

          Data from Local System

          1
          T1005

          Email Collection

          2
          T1114

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Teheaotp.tmp
            Filesize

            3.1MB

            MD5

            275f5752b1f0086ddaceb8abab43f86c

            SHA1

            19a4a3852df53c5cbd7351f441d6d626610ec253

            SHA256

            f415df3c22123988e6a21a36b35471fbb4b0ab42682b95a2151995530f33c1f4

            SHA512

            707dbb73610702b027528a84a1eee3485dcd6105485901a4144e9bf24d682f5eb32edc846db956bac5f4b5858ee044bd7b0c855203d3b2ce9b7afbbebfc46a7d

          • memory/4460-160-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-154-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-133-0x0000000000400000-0x0000000000630000-memory.dmp
            Filesize

            2.2MB

          • memory/4460-151-0x0000000002E70000-0x00000000038BC000-memory.dmp
            Filesize

            10.3MB

          • memory/4460-162-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-153-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-163-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-152-0x0000000003E50000-0x0000000003E51000-memory.dmp
            Filesize

            4KB

          • memory/4460-161-0x0000000004130000-0x0000000004131000-memory.dmp
            Filesize

            4KB

          • memory/4460-130-0x0000000000945000-0x0000000000A22000-memory.dmp
            Filesize

            884KB

          • memory/4460-159-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-132-0x0000000000400000-0x0000000000630000-memory.dmp
            Filesize

            2.2MB

          • memory/4460-158-0x0000000003E70000-0x0000000003E71000-memory.dmp
            Filesize

            4KB

          • memory/4460-157-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-156-0x0000000003A80000-0x0000000003BC0000-memory.dmp
            Filesize

            1.2MB

          • memory/4460-155-0x0000000003E60000-0x0000000003E61000-memory.dmp
            Filesize

            4KB

          • memory/4460-131-0x0000000002470000-0x0000000002695000-memory.dmp
            Filesize

            2.1MB

          • memory/4460-148-0x0000000002E70000-0x00000000038BC000-memory.dmp
            Filesize

            10.3MB

          • memory/4460-149-0x0000000002E70000-0x00000000038BC000-memory.dmp
            Filesize

            10.3MB

          • memory/4460-150-0x0000000003CE0000-0x0000000003CE1000-memory.dmp
            Filesize

            4KB

          • memory/4780-142-0x0000000000FF0000-0x0000000000FF2000-memory.dmp
            Filesize

            8KB

          • memory/4780-137-0x0000000000FA0000-0x0000000000FA2000-memory.dmp
            Filesize

            8KB

          • memory/4780-136-0x0000000000F90000-0x0000000000F92000-memory.dmp
            Filesize

            8KB

          • memory/4780-134-0x0000000000000000-mapping.dmp
          • memory/4780-146-0x0000000001230000-0x0000000001232000-memory.dmp
            Filesize

            8KB

          • memory/4780-145-0x0000000001220000-0x0000000001222000-memory.dmp
            Filesize

            8KB

          • memory/4780-144-0x0000000001210000-0x0000000001212000-memory.dmp
            Filesize

            8KB

          • memory/4780-143-0x0000000001200000-0x0000000001202000-memory.dmp
            Filesize

            8KB

          • memory/4780-139-0x0000000000FC0000-0x0000000000FC2000-memory.dmp
            Filesize

            8KB

          • memory/4780-141-0x0000000000FE0000-0x0000000000FE2000-memory.dmp
            Filesize

            8KB

          • memory/4780-140-0x0000000000FD0000-0x0000000000FD2000-memory.dmp
            Filesize

            8KB

          • memory/4780-138-0x0000000000FB0000-0x0000000000FB2000-memory.dmp
            Filesize

            8KB

          • memory/4780-135-0x0000000000F80000-0x0000000000F82000-memory.dmp
            Filesize

            8KB

          • memory/4980-164-0x0000000000000000-mapping.dmp
          • memory/4980-166-0x0000000003CA0000-0x0000000003CA1000-memory.dmp
            Filesize

            4KB

          • memory/4980-167-0x0000000002F50000-0x000000000399C000-memory.dmp
            Filesize

            10.3MB

          • memory/4980-168-0x0000000004020000-0x0000000004021000-memory.dmp
            Filesize

            4KB

          • memory/4980-170-0x00000000039A0000-0x0000000003AE0000-memory.dmp
            Filesize

            1.2MB

          • memory/4980-171-0x0000000000AB0000-0x00000000013DC000-memory.dmp
            Filesize

            9.2MB

          • memory/4980-169-0x00000000039A0000-0x0000000003AE0000-memory.dmp
            Filesize

            1.2MB

          • memory/4980-172-0x0000000002F50000-0x000000000399C000-memory.dmp
            Filesize

            10.3MB