Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe
Resource
win10v2004-20220721-en
General
-
Target
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe
-
Size
605KB
-
MD5
15a3c7858edf89cc13ab89c431c1c3a6
-
SHA1
e0cef058068d5301afcb16ead6e751b540b403c3
-
SHA256
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
-
SHA512
20025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
Malware Config
Signatures
-
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1724-88-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1724-89-0x0000000000411790-mapping.dmp MailPassView behavioral1/memory/1724-92-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1724-94-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1724-95-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2028-106-0x00000000004439CC-mapping.dmp WebBrowserPassView behavioral1/memory/2028-105-0x0000000000400000-0x000000000045A000-memory.dmp WebBrowserPassView behavioral1/memory/2028-109-0x0000000000400000-0x000000000045A000-memory.dmp WebBrowserPassView behavioral1/memory/2028-111-0x0000000000400000-0x000000000045A000-memory.dmp WebBrowserPassView -
Nirsoft 9 IoCs
resource yara_rule behavioral1/memory/1724-88-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1724-89-0x0000000000411790-mapping.dmp Nirsoft behavioral1/memory/1724-92-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1724-94-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1724-95-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/2028-106-0x00000000004439CC-mapping.dmp Nirsoft behavioral1/memory/2028-105-0x0000000000400000-0x000000000045A000-memory.dmp Nirsoft behavioral1/memory/2028-109-0x0000000000400000-0x000000000045A000-memory.dmp Nirsoft behavioral1/memory/2028-111-0x0000000000400000-0x000000000045A000-memory.dmp Nirsoft -
Executes dropped EXE 3 IoCs
pid Process 1720 foldar.exe 748 foldar.exe 1804 foldar.exe -
Loads dropped DLL 1 IoCs
pid Process 2032 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1720 set thread context of 1804 1720 foldar.exe 29 PID 1804 set thread context of 1724 1804 foldar.exe 31 PID 1804 set thread context of 2028 1804 foldar.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2032 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 1720 foldar.exe 748 foldar.exe 1720 foldar.exe 1720 foldar.exe 1720 foldar.exe 2028 vbc.exe 2028 vbc.exe 2028 vbc.exe 2028 vbc.exe 2028 vbc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2032 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe Token: SeDebugPrivilege 1720 foldar.exe Token: SeDebugPrivilege 748 foldar.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1804 foldar.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1720 2032 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 27 PID 2032 wrote to memory of 1720 2032 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 27 PID 2032 wrote to memory of 1720 2032 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 27 PID 2032 wrote to memory of 1720 2032 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 27 PID 1720 wrote to memory of 748 1720 foldar.exe 28 PID 1720 wrote to memory of 748 1720 foldar.exe 28 PID 1720 wrote to memory of 748 1720 foldar.exe 28 PID 1720 wrote to memory of 748 1720 foldar.exe 28 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1720 wrote to memory of 1804 1720 foldar.exe 29 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 1724 1804 foldar.exe 31 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32 PID 1804 wrote to memory of 2028 1804 foldar.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe"C:\Users\Admin\AppData\Local\Temp\57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\Mail.txt"4⤵
- Accesses Microsoft Outlook accounts
PID:1724
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\Web.txt"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
32B
MD57bb1744f94d33a785800612033918dc6
SHA1bb28cffcbe3ab31bff7660ecdf18fe3da65e5462
SHA256878a251e3d3a1f6d0f5211c20fa89fc4f4e649638b5bbb471c57bf88836f9ff5
SHA5128304ab83b7705ab6316665480da5913acdd647e2897386a07028e692a22cc5ef746b8644a47e0f92925ff01b07b911c9241ba661aaf95068cde7f1689626ac67
-
Filesize
32B
MD57bb1744f94d33a785800612033918dc6
SHA1bb28cffcbe3ab31bff7660ecdf18fe3da65e5462
SHA256878a251e3d3a1f6d0f5211c20fa89fc4f4e649638b5bbb471c57bf88836f9ff5
SHA5128304ab83b7705ab6316665480da5913acdd647e2897386a07028e692a22cc5ef746b8644a47e0f92925ff01b07b911c9241ba661aaf95068cde7f1689626ac67
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222