Analysis
-
max time kernel
129s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe
Resource
win10v2004-20220414-en
General
-
Target
1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe
-
Size
754KB
-
MD5
0bd7bc24988a724e7d5418d5bc6f4623
-
SHA1
6c8ba77ed05cce7a3e8e6dc6cef448c9341ecb80
-
SHA256
1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c
-
SHA512
f965edb7008af0f4f7aeba4c3f1a899a9262dcc38c3c0d3266045816cb879e05d51e5b89f88c03f950fb6c07d9bc9f5fe79b5704f11ac5151c80115d6f06aa2d
Malware Config
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/784-146-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/784-148-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/784-149-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4856-138-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/4856-140-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/4856-142-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/4856-143-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/4856-138-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4856-140-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4856-142-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4856-143-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/784-146-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/784-148-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/784-149-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2820 set thread context of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 324 set thread context of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 set thread context of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 4856 vbc.exe 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 2820 wrote to memory of 324 2820 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 89 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 4856 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 90 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91 PID 324 wrote to memory of 784 324 1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe"C:\Users\Admin\AppData\Local\Temp\1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe"C:\Users\Admin\AppData\Local\Temp\1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpAE9F.tmp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpB6CE.tmp"3⤵
- Accesses Microsoft Outlook accounts
PID:784
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\1d425843f04fdb8b7d379c09e84751e69d164f23869d981fb26a10dd9e9afc1c.exe.log
Filesize500B
MD5298d9d1774105fc942fb8bbf03cfe267
SHA1472a25b3a1529a342e24c4332691c974af205fa4
SHA25623fcbc819b0a201a04c630d08f53b40475f84add3d2bef87b2405d92f13ce2b1
SHA512bdb6aacee078287f51306f8f69da1b025cc5ec0359a2f1bd4b29bc87cee569fced3e25d55cd13a414b3ec9390b6e393bf975b52de4c7896641dfa5c175357cbe
-
Filesize
4KB
MD5bdf65f70610625cc771c5cc7ce168c7d
SHA1a8829b1c071ed0521d11925a98468c12a53a03b8
SHA256b66236dd86f140ca02db0c296e45032b272de2895c4f047a562e73bc8395dba5
SHA512add2db50b0440b07ecc48a5fde7f0b72e84b76f11ea060944afa28ddd03791e6adb3bfca704254131fb3f591f484b37f7276fab96b0c4776a27cb526bcf5f3a4