Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe
Resource
win10v2004-20220721-en
General
-
Target
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe
-
Size
605KB
-
MD5
15a3c7858edf89cc13ab89c431c1c3a6
-
SHA1
e0cef058068d5301afcb16ead6e751b540b403c3
-
SHA256
57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
-
SHA512
20025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
Malware Config
Signatures
-
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4852-148-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4852-150-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4852-151-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4852-152-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4332-155-0x0000000000400000-0x000000000045A000-memory.dmp WebBrowserPassView behavioral2/memory/4332-157-0x0000000000400000-0x000000000045A000-memory.dmp WebBrowserPassView behavioral2/memory/4332-158-0x0000000000400000-0x000000000045A000-memory.dmp WebBrowserPassView behavioral2/memory/4332-160-0x0000000000400000-0x000000000045A000-memory.dmp WebBrowserPassView -
Nirsoft 8 IoCs
resource yara_rule behavioral2/memory/4852-148-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4852-150-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4852-151-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4852-152-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4332-155-0x0000000000400000-0x000000000045A000-memory.dmp Nirsoft behavioral2/memory/4332-157-0x0000000000400000-0x000000000045A000-memory.dmp Nirsoft behavioral2/memory/4332-158-0x0000000000400000-0x000000000045A000-memory.dmp Nirsoft behavioral2/memory/4332-160-0x0000000000400000-0x000000000045A000-memory.dmp Nirsoft -
Executes dropped EXE 3 IoCs
pid Process 4180 foldar.exe 1556 foldar.exe 3448 foldar.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation foldar.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 checkip.dyndns.org -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4180 set thread context of 3448 4180 foldar.exe 82 PID 3448 set thread context of 4852 3448 foldar.exe 83 PID 3448 set thread context of 4332 3448 foldar.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4652 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 4180 foldar.exe 1556 foldar.exe 4180 foldar.exe 4180 foldar.exe 4180 foldar.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe 4332 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4652 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe Token: SeDebugPrivilege 4180 foldar.exe Token: SeDebugPrivilege 1556 foldar.exe Token: SeDebugPrivilege 3448 foldar.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3448 foldar.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4652 wrote to memory of 4180 4652 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 79 PID 4652 wrote to memory of 4180 4652 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 79 PID 4652 wrote to memory of 4180 4652 57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe 79 PID 4180 wrote to memory of 1556 4180 foldar.exe 80 PID 4180 wrote to memory of 1556 4180 foldar.exe 80 PID 4180 wrote to memory of 1556 4180 foldar.exe 80 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 4180 wrote to memory of 3448 4180 foldar.exe 82 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4852 3448 foldar.exe 83 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84 PID 3448 wrote to memory of 4332 3448 foldar.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe"C:\Users\Admin\AppData\Local\Temp\57dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\foldar.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\Mail.txt"4⤵
- Accesses Microsoft Outlook accounts
PID:4852
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\Web.txt"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b9daf88205e7429feaceda806bd561d2
SHA11893c80e74cfea9914343c6e4213393804a92dd1
SHA256efa03262d4c3f5a46ab526946b8c7450d37eff4b5f8d53b43468655eea8cc027
SHA512649ba70698611bd66aa91e40aaa81327a60efc098c1705729f9eb316c18e9bcca6af2363b24f8ac4aea5d25f12303833aedaada6fd26f1eebb86711a4e9baaf1
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
605KB
MD515a3c7858edf89cc13ab89c431c1c3a6
SHA1e0cef058068d5301afcb16ead6e751b540b403c3
SHA25657dec4bc69b77b52520e3d476e39949f0be803647a70f7d00ecd15be08035185
SHA51220025bfc2bb8d99f56ee1edeaa03ee61ef52a131e764e36046b87578813cde2a101727d6e2cb4404ac0b7a770fe43116e5b0b4918bcca3d9e758be900b905222
-
Filesize
32B
MD57bb1744f94d33a785800612033918dc6
SHA1bb28cffcbe3ab31bff7660ecdf18fe3da65e5462
SHA256878a251e3d3a1f6d0f5211c20fa89fc4f4e649638b5bbb471c57bf88836f9ff5
SHA5128304ab83b7705ab6316665480da5913acdd647e2897386a07028e692a22cc5ef746b8644a47e0f92925ff01b07b911c9241ba661aaf95068cde7f1689626ac67
-
Filesize
32B
MD57bb1744f94d33a785800612033918dc6
SHA1bb28cffcbe3ab31bff7660ecdf18fe3da65e5462
SHA256878a251e3d3a1f6d0f5211c20fa89fc4f4e649638b5bbb471c57bf88836f9ff5
SHA5128304ab83b7705ab6316665480da5913acdd647e2897386a07028e692a22cc5ef746b8644a47e0f92925ff01b07b911c9241ba661aaf95068cde7f1689626ac67