Analysis
-
max time kernel
84s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 03:28
Static task
static1
Behavioral task
behavioral1
Sample
HCtR5cTfBBvX0Tt.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HCtR5cTfBBvX0Tt.exe
Resource
win10v2004-20220414-en
General
-
Target
HCtR5cTfBBvX0Tt.exe
-
Size
956KB
-
MD5
946617f29b6f4d728a590d6eaae36126
-
SHA1
d06818f1f24d85e26d7159845076f346564253a0
-
SHA256
45ef1e51df38e6778aaf2cd726748b55459b4aa54a2c8c2fea445cab0885f7bc
-
SHA512
7204f1163662f391fe09c2637ca9c2e07e08bc1c047fab4e1594c49a37fb222093d86298c267cec9ee27f842f538f480c2bb8078ffea59c501f4777ff50a7d2f
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@willsmith1.,
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1644-57-0x00000000004E0000-0x00000000004E8000-memory.dmp coreentity -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1644-58-0x0000000005E30000-0x0000000005EE8000-memory.dmp rezer0 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HCtR5cTfBBvX0Tt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation HCtR5cTfBBvX0Tt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
HCtR5cTfBBvX0Tt.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook HCtR5cTfBBvX0Tt.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook HCtR5cTfBBvX0Tt.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook HCtR5cTfBBvX0Tt.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook HCtR5cTfBBvX0Tt.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook HCtR5cTfBBvX0Tt.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook HCtR5cTfBBvX0Tt.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HCtR5cTfBBvX0Tt.exedescription pid process target process PID 1644 set thread context of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
HCtR5cTfBBvX0Tt.exepid process 844 HCtR5cTfBBvX0Tt.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
HCtR5cTfBBvX0Tt.exepid process 844 HCtR5cTfBBvX0Tt.exe 844 HCtR5cTfBBvX0Tt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
HCtR5cTfBBvX0Tt.exeHCtR5cTfBBvX0Tt.exedescription pid process Token: SeDebugPrivilege 1644 HCtR5cTfBBvX0Tt.exe Token: SeDebugPrivilege 844 HCtR5cTfBBvX0Tt.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
HCtR5cTfBBvX0Tt.exepid process 844 HCtR5cTfBBvX0Tt.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
HCtR5cTfBBvX0Tt.exedescription pid process target process PID 1644 wrote to memory of 1064 1644 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1644 wrote to memory of 1064 1644 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1644 wrote to memory of 1064 1644 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1644 wrote to memory of 1064 1644 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1644 wrote to memory of 844 1644 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe -
outlook_office_path 1 IoCs
Processes:
HCtR5cTfBBvX0Tt.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe -
outlook_win_path 1 IoCs
Processes:
HCtR5cTfBBvX0Tt.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HCtR5cTfBBvX0Tt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AvKneptmDajjT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB9A0.tmp"2⤵
- Creates scheduled task(s)
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b2336f50de47446f830fd67d5313a0ec
SHA1ec2ef40bcf9a2dcf33b627b1416d288429559b82
SHA25668773bf984a5f20858101c30b61bc82567ca5c4e38e8823d5baea133006e6fb6
SHA512dc0d6537b8803695bee4aeb04fc3ce331a4ce721e940c6b27bcb3b29026134754de9ebe5a99d641357d93e1048a69fdfd365bf15fb40c8cf5ec1e6370767f730