Analysis
-
max time kernel
151s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 23:10
Static task
static1
Behavioral task
behavioral1
Sample
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe
Resource
win10v2004-20220414-en
General
-
Target
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe
-
Size
4.4MB
-
MD5
f928736eeb374926b60aa36b64b80746
-
SHA1
ff479c35c28dc942b0319acdbfa09db9b1f07f75
-
SHA256
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
-
SHA512
d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
Malware Config
Signatures
-
NirSoft MailPassView 8 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/2792-140-0x0000000000000000-mapping.dmp MailPassView behavioral2/memory/2792-141-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/2792-142-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/2792-143-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/4256-152-0x0000000000000000-mapping.dmp MailPassView behavioral2/memory/4256-153-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4256-155-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4256-156-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 8 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/2792-140-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/2792-141-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/2792-142-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/2792-143-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/2796-159-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/2796-160-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/2796-162-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/2796-164-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 12 IoCs
Processes:
resource yara_rule behavioral2/memory/2792-140-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/2792-141-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/2792-142-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/2792-143-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/4256-152-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/4256-153-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4256-155-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4256-156-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/2796-159-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/2796-160-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/2796-162-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/2796-164-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
tni.exewlrmdr.exewlrmdr.execsrss.exepid process 2060 tni.exe 1188 wlrmdr.exe 2792 wlrmdr.exe 4360 csrss.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exewlrmdr.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation wlrmdr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wlrmdr.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" wlrmdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" wlrmdr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" csrss.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 whatismyipaddress.com 17 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
wlrmdr.exewlrmdr.exedescription pid process target process PID 1188 set thread context of 2792 1188 wlrmdr.exe wlrmdr.exe PID 2792 set thread context of 4256 2792 wlrmdr.exe vbc.exe PID 2792 set thread context of 2796 2792 wlrmdr.exe vbc.exe -
Drops file in Windows directory 3 IoCs
Processes:
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exewlrmdr.exedescription ioc process File created C:\Windows\wlrmdr.exe 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe File opened for modification C:\Windows\wlrmdr.exe 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe File opened for modification C:\Windows\wlrmdr.exe wlrmdr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
wlrmdr.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wlrmdr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exepid process 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe 4360 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wlrmdr.execsrss.exedescription pid process Token: SeDebugPrivilege 2792 wlrmdr.exe Token: SeDebugPrivilege 4360 csrss.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exewlrmdr.exewlrmdr.exedescription pid process target process PID 2320 wrote to memory of 2060 2320 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe tni.exe PID 2320 wrote to memory of 2060 2320 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe tni.exe PID 2320 wrote to memory of 2060 2320 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe tni.exe PID 2320 wrote to memory of 1188 2320 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe wlrmdr.exe PID 2320 wrote to memory of 1188 2320 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe wlrmdr.exe PID 2320 wrote to memory of 1188 2320 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 2792 1188 wlrmdr.exe wlrmdr.exe PID 1188 wrote to memory of 4360 1188 wlrmdr.exe csrss.exe PID 1188 wrote to memory of 4360 1188 wlrmdr.exe csrss.exe PID 1188 wrote to memory of 4360 1188 wlrmdr.exe csrss.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 4256 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe PID 2792 wrote to memory of 2796 2792 wlrmdr.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe"C:\Users\Admin\AppData\Local\Temp\377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\tni.exe"C:\Users\Admin\AppData\Roaming\tni.exe"2⤵
- Executes dropped EXE
-
C:\Windows\wlrmdr.exe"C:\Windows\wlrmdr.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\wlrmdr.exe"C:\Windows\wlrmdr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"4⤵
-
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe" -keyhide -prochide 2792 -reg C:\Windows\wlrmdr.exe -proc 2792 C:\Windows\wlrmdr.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\holderwb.txtFilesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
C:\Users\Admin\AppData\Roaming\csrss.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Users\Admin\AppData\Roaming\csrss.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Users\Admin\AppData\Roaming\tni.exeFilesize
4.0MB
MD5f1b0754b98de84caa935d559a5e1de0e
SHA1bc781f71922fe03416a045980991e7806a412542
SHA256a1c6e7db9375bd95104d6b7056350c75fea9c73ed1acd458269deb86fb7cf993
SHA512245bfe6bb18d5ba244013a66d643430469115ce065354dc0c3b3144c11b3d1f89efc4bae9946732bbf065ef255b96ccdf3ab0c6eec8ff494c4794c7e8a91d65d
-
C:\Users\Admin\AppData\Roaming\tni.exeFilesize
4.0MB
MD5f1b0754b98de84caa935d559a5e1de0e
SHA1bc781f71922fe03416a045980991e7806a412542
SHA256a1c6e7db9375bd95104d6b7056350c75fea9c73ed1acd458269deb86fb7cf993
SHA512245bfe6bb18d5ba244013a66d643430469115ce065354dc0c3b3144c11b3d1f89efc4bae9946732bbf065ef255b96ccdf3ab0c6eec8ff494c4794c7e8a91d65d
-
C:\Windows\wlrmdr.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Windows\wlrmdr.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Windows\wlrmdr.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
memory/1188-134-0x0000000000000000-mapping.dmp
-
memory/1188-139-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/1188-150-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/2060-138-0x0000000000400000-0x00000000021DF180-memory.dmpFilesize
29.9MB
-
memory/2060-131-0x0000000000000000-mapping.dmp
-
memory/2320-130-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/2320-137-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/2792-141-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/2792-157-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/2792-146-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/2792-143-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/2792-142-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/2792-140-0x0000000000000000-mapping.dmp
-
memory/2796-164-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2796-162-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2796-160-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2796-159-0x0000000000000000-mapping.dmp
-
memory/4256-156-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4256-155-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4256-153-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4256-152-0x0000000000000000-mapping.dmp
-
memory/4360-158-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/4360-151-0x0000000074880000-0x0000000074E31000-memory.dmpFilesize
5.7MB
-
memory/4360-147-0x0000000000000000-mapping.dmp