Analysis
-
max time kernel
70s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 05:07
Static task
static1
Behavioral task
behavioral1
Sample
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe
Resource
win10v2004-20220722-en
General
-
Target
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe
-
Size
291KB
-
MD5
471c1bfe49a45efdbd925956ef79b18a
-
SHA1
4891a1b912848c5990ceabd7cfb815df4d7ee6ab
-
SHA256
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e
-
SHA512
58db68688cd70eb7d4646d6f31b618525b3c5bb282955d530ab023e18ebefd0d0f6be397f0c0866ae7d8c93e30c57a8ea6ffd7f60ccb94c470f13babae0100c3
Malware Config
Signatures
-
404 Keylogger
Information stealer and keylogger first seen in 2019.
-
404 Keylogger Main Executable 1 IoCs
resource yara_rule behavioral1/memory/2008-59-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\PPnQl = "C:\\Users\\Admin\\AppData\\Local\\PPnQlf\\PPnQlfntG.hta" 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 -
Program crash 1 IoCs
pid pid_target Process procid_target 1324 2008 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 2008 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe Token: SeDebugPrivilege 2008 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2008 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 1700 wrote to memory of 2008 1700 6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe 27 PID 2008 wrote to memory of 1324 2008 InstallUtil.exe 29 PID 2008 wrote to memory of 1324 2008 InstallUtil.exe 29 PID 2008 wrote to memory of 1324 2008 InstallUtil.exe 29 PID 2008 wrote to memory of 1324 2008 InstallUtil.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe"C:\Users\Admin\AppData\Local\Temp\6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 13403⤵
- Program crash
PID:1324
-
-