Analysis

  • max time kernel
    167s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 00:25

General

  • Target

    Order Confirmations_PRQ00002725..pdf.exe

  • Size

    714KB

  • MD5

    b77c67e726d23e9c98bca5fae1e39a35

  • SHA1

    2eba0b79fd622fe0ac7fc16cd2eb08d4504bce26

  • SHA256

    210659513be90bb7cf37f17a59eec35457d4af1d0fe937deacfb3901a4ffb9ea

  • SHA512

    573c8631ac3b507f0e884d74075025875503df9c108210f4399cacc5e04a1e5c222372d250f6ed61d394ef7eae10670e88381ccd4f308a8b53d6753ac98cef5e

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    amazinggrace12345

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Order Confirmations_PRQ00002725..pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Order Confirmations_PRQ00002725..pdf.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:3664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3664-130-0x00000000006C0000-0x0000000000778000-memory.dmp

    Filesize

    736KB

  • memory/3664-131-0x00000000057B0000-0x0000000005D54000-memory.dmp

    Filesize

    5.6MB

  • memory/3664-132-0x00000000053A0000-0x0000000005432000-memory.dmp

    Filesize

    584KB

  • memory/3664-133-0x0000000005380000-0x000000000538A000-memory.dmp

    Filesize

    40KB

  • memory/3664-134-0x000000000D760000-0x000000000D7FC000-memory.dmp

    Filesize

    624KB

  • memory/3664-135-0x000000000DA00000-0x000000000DA66000-memory.dmp

    Filesize

    408KB

  • memory/3664-136-0x000000000D890000-0x000000000D8E0000-memory.dmp

    Filesize

    320KB