Analysis
-
max time kernel
70s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:37
Static task
static1
Behavioral task
behavioral1
Sample
x2KDOSVNRiSbYcK.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
x2KDOSVNRiSbYcK.exe
Resource
win10v2004-20220414-en
General
-
Target
x2KDOSVNRiSbYcK.exe
-
Size
871KB
-
MD5
23623b167a6e271b89f266cda6f4d308
-
SHA1
b8f5846cf059451256cf6d25f804588651a4b04b
-
SHA256
8a3dd3eb355760a77c7bd89e2316c7741e37f9b20435a23d144e58ba856bd7c7
-
SHA512
11830c8366ec005b3439c9b9bf4de62db61d44d0c296b9d91a2c3705fa2f3454abd84bc1a711f55db2926c89f6556c3751e4af292e4cfe0456038886552fe760
Malware Config
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
requestShow@
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1336-56-0x00000000006F0000-0x00000000006F8000-memory.dmp coreentity -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1336-57-0x0000000005BF0000-0x0000000005C9E000-memory.dmp rezer0 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
x2KDOSVNRiSbYcK.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation x2KDOSVNRiSbYcK.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
x2KDOSVNRiSbYcK.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook x2KDOSVNRiSbYcK.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook x2KDOSVNRiSbYcK.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook x2KDOSVNRiSbYcK.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook x2KDOSVNRiSbYcK.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook x2KDOSVNRiSbYcK.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook x2KDOSVNRiSbYcK.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
x2KDOSVNRiSbYcK.exedescription pid process target process PID 1336 set thread context of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
x2KDOSVNRiSbYcK.exepid process 2036 x2KDOSVNRiSbYcK.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
x2KDOSVNRiSbYcK.exepid process 2036 x2KDOSVNRiSbYcK.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
x2KDOSVNRiSbYcK.exedescription pid process Token: SeDebugPrivilege 2036 x2KDOSVNRiSbYcK.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
x2KDOSVNRiSbYcK.exepid process 2036 x2KDOSVNRiSbYcK.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
x2KDOSVNRiSbYcK.exedescription pid process target process PID 1336 wrote to memory of 1484 1336 x2KDOSVNRiSbYcK.exe schtasks.exe PID 1336 wrote to memory of 1484 1336 x2KDOSVNRiSbYcK.exe schtasks.exe PID 1336 wrote to memory of 1484 1336 x2KDOSVNRiSbYcK.exe schtasks.exe PID 1336 wrote to memory of 1484 1336 x2KDOSVNRiSbYcK.exe schtasks.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe PID 1336 wrote to memory of 2036 1336 x2KDOSVNRiSbYcK.exe x2KDOSVNRiSbYcK.exe -
outlook_office_path 1 IoCs
Processes:
x2KDOSVNRiSbYcK.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe -
outlook_win_path 1 IoCs
Processes:
x2KDOSVNRiSbYcK.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x2KDOSVNRiSbYcK.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\x2KDOSVNRiSbYcK.exe"C:\Users\Admin\AppData\Local\Temp\x2KDOSVNRiSbYcK.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IWRsxzh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1095.tmp"2⤵
- Creates scheduled task(s)
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\x2KDOSVNRiSbYcK.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5729d013f0e64abac7478802b66a0be6c
SHA1cecba30543dcafe73311aad0cbc9931e91f1c4da
SHA2567c330cc468f71f3def86c337d43cb6a63b10d55222de0eb895b19b52540701e1
SHA51203ea0d6c5122aa74740ef09f97e02fa40dc60b81acd832939ddced538cdf0dc25a8327eb9976f59e01a7088d699a1c3de43c7e66cbd66bd3473d64b3789b8715