Analysis

  • max time kernel
    43s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 02:15

General

  • Target

    MA20-002423 WinterTrade Zrt Szeged Hungary.exe

  • Size

    995KB

  • MD5

    821b0e70a2b51999a55f15a38e6d8ca4

  • SHA1

    698488b54881ced2cebea6d0c8b57060bd232ab4

  • SHA256

    d17e7aae62fd256c264b2602f913c5b918501a1416abb5c58a4f14bcafa2b0d6

  • SHA512

    a2d9664daa16d67b4c62ec77d116037da9f93fa302e60a39836bf27da0d1beee2ebde30b6e4e6f36341e6573fe41caab0babe2e55a9b0565e5c20334244cbbfd

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    gnaeask@2015

Signatures

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MA20-002423 WinterTrade Zrt Szeged Hungary.exe
    "C:\Users\Admin\AppData\Local\Temp\MA20-002423 WinterTrade Zrt Szeged Hungary.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HuxzEmPpQT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5CC.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:948
    • C:\Users\Admin\AppData\Local\Temp\MA20-002423 WinterTrade Zrt Szeged Hungary.exe
      "{path}"
      2⤵
      • Checks computer location settings
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:1680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp5CC.tmp

    Filesize

    1KB

    MD5

    a10cd11020cb9ff1fb85a9954dade6a1

    SHA1

    e87c0bef2999d81787507219fbbcfdb2e6bf2857

    SHA256

    8ff8b28a1f2f82e4eda5a5e1da580f01c41206ffbc35c1075cb2ed43d2c2ec54

    SHA512

    3ee4ee9158f0a41fd98784a2f7e00515043036b8f5c159b0b8e1aff102c4f029f19e1a5efc80a1f1a58d0230f2d689605f61d9f83cc0309359dbf888b4591091

  • memory/948-58-0x0000000000000000-mapping.dmp

  • memory/1680-84-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-114-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-570-0x00000000008A0000-0x00000000008E4000-memory.dmp

    Filesize

    272KB

  • memory/1680-120-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-60-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-61-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-63-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-64-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-65-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-66-0x00000000004A13AE-mapping.dmp

  • memory/1680-68-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-70-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-72-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-88-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-76-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-78-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-80-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-82-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-122-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-118-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-74-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-90-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-92-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-94-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-96-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-98-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-100-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-102-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-104-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-106-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-108-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-110-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-112-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-86-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1680-116-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1992-57-0x0000000004450000-0x00000000044FE000-memory.dmp

    Filesize

    696KB

  • memory/1992-55-0x0000000074E91000-0x0000000074E93000-memory.dmp

    Filesize

    8KB

  • memory/1992-54-0x0000000000DC0000-0x0000000000EBE000-memory.dmp

    Filesize

    1016KB

  • memory/1992-56-0x0000000000780000-0x0000000000788000-memory.dmp

    Filesize

    32KB