Analysis
-
max time kernel
45s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 21:22
Static task
static1
Behavioral task
behavioral1
Sample
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe
Resource
win10v2004-20220721-en
General
-
Target
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe
-
Size
332KB
-
MD5
173ec773d0b146dfb249629550901ded
-
SHA1
7bfa3586a135f95dba15b00385d8eec2f838d2be
-
SHA256
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d
-
SHA512
a2a82ce38c42faa77acf038fecc7c95c1729d5d49ccbd6eb36e24d5f61c0435c633ba217cbde54df02623dc0092e4555c14b809ba0095d74a88ee123b956480f
Malware Config
Signatures
-
404 Keylogger
Information stealer and keylogger first seen in 2019.
-
404 Keylogger Main Executable 1 IoCs
resource yara_rule behavioral1/memory/1964-57-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\HdfgI = "C:\\Users\\Admin\\AppData\\Local\\HdfgIH\\HdfgIHBpE.hta" 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1168 1964 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1964 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1680 wrote to memory of 1964 1680 85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe 28 PID 1964 wrote to memory of 1168 1964 InstallUtil.exe 30 PID 1964 wrote to memory of 1168 1964 InstallUtil.exe 30 PID 1964 wrote to memory of 1168 1964 InstallUtil.exe 30 PID 1964 wrote to memory of 1168 1964 InstallUtil.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe"C:\Users\Admin\AppData\Local\Temp\85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 13563⤵
- Program crash
PID:1168
-
-