Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
submitted
27-07-2022 00:20
Static task
static1
Behavioral task
behavioral1
Sample
2fe0a96562d37f562e983aa77cca5018.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
2fe0a96562d37f562e983aa77cca5018.exe
Resource
win10v2004-20220721-en
General
-
Target
2fe0a96562d37f562e983aa77cca5018.exe
-
Size
830KB
-
MD5
2fe0a96562d37f562e983aa77cca5018
-
SHA1
93f2dd9d3cfdf6c1696c6b4091100edc3638bcc5
-
SHA256
f4c69cc748d3614f1ac9a32db3c24f756532cb96ebe520344567fc0e29af93fa
-
SHA512
d61ac67afca3c7ef1bd69dd1f4d218f0799654d2b3ead78a3857420c046d81d21107520d1a675a2cda85463e6d88a51e5c257ad344d1823ff37fc36a36179aa7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2fe0a96562d37f562e983aa77cca5018.exe Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2fe0a96562d37f562e983aa77cca5018.exe Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2fe0a96562d37f562e983aa77cca5018.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Patsyhjz = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ilepr\\Patsyhjz.exe\"" 2fe0a96562d37f562e983aa77cca5018.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 2fe0a96562d37f562e983aa77cca5018.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2fe0a96562d37f562e983aa77cca5018.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 624 2fe0a96562d37f562e983aa77cca5018.exe 624 2fe0a96562d37f562e983aa77cca5018.exe 624 2fe0a96562d37f562e983aa77cca5018.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 624 2fe0a96562d37f562e983aa77cca5018.exe Token: SeDebugPrivilege 624 2fe0a96562d37f562e983aa77cca5018.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 624 wrote to memory of 1984 624 2fe0a96562d37f562e983aa77cca5018.exe 82 PID 624 wrote to memory of 1984 624 2fe0a96562d37f562e983aa77cca5018.exe 82 PID 1984 wrote to memory of 3436 1984 cmd.exe 84 PID 1984 wrote to memory of 3436 1984 cmd.exe 84 PID 1984 wrote to memory of 4372 1984 cmd.exe 85 PID 1984 wrote to memory of 4372 1984 cmd.exe 85 PID 1984 wrote to memory of 4604 1984 cmd.exe 86 PID 1984 wrote to memory of 4604 1984 cmd.exe 86 PID 624 wrote to memory of 116 624 2fe0a96562d37f562e983aa77cca5018.exe 87 PID 624 wrote to memory of 116 624 2fe0a96562d37f562e983aa77cca5018.exe 87 PID 116 wrote to memory of 3716 116 cmd.exe 89 PID 116 wrote to memory of 3716 116 cmd.exe 89 PID 116 wrote to memory of 2176 116 cmd.exe 90 PID 116 wrote to memory of 2176 116 cmd.exe 90 PID 116 wrote to memory of 3056 116 cmd.exe 91 PID 116 wrote to memory of 3056 116 cmd.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2fe0a96562d37f562e983aa77cca5018.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2fe0a96562d37f562e983aa77cca5018.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fe0a96562d37f562e983aa77cca5018.exe"C:\Users\Admin\AppData\Local\Temp\2fe0a96562d37f562e983aa77cca5018.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:624 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3436
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:4372
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:4604
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key2⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3716
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile name="65001" key=clear3⤵PID:2176
-
-
C:\Windows\system32\findstr.exefindstr Key3⤵PID:3056
-
-