Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • submitted
    27-07-2022 00:20

General

  • Target

    2fe0a96562d37f562e983aa77cca5018.exe

  • Size

    830KB

  • MD5

    2fe0a96562d37f562e983aa77cca5018

  • SHA1

    93f2dd9d3cfdf6c1696c6b4091100edc3638bcc5

  • SHA256

    f4c69cc748d3614f1ac9a32db3c24f756532cb96ebe520344567fc0e29af93fa

  • SHA512

    d61ac67afca3c7ef1bd69dd1f4d218f0799654d2b3ead78a3857420c046d81d21107520d1a675a2cda85463e6d88a51e5c257ad344d1823ff37fc36a36179aa7

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fe0a96562d37f562e983aa77cca5018.exe
    "C:\Users\Admin\AppData\Local\Temp\2fe0a96562d37f562e983aa77cca5018.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Adds Run key to start application
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:624
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3436
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
            PID:4372
          • C:\Windows\system32\findstr.exe
            findstr All
            3⤵
              PID:4604
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:116
            • C:\Windows\system32\chcp.com
              chcp 65001
              3⤵
                PID:3716
              • C:\Windows\system32\netsh.exe
                netsh wlan show profile name="65001" key=clear
                3⤵
                  PID:2176
                • C:\Windows\system32\findstr.exe
                  findstr Key
                  3⤵
                    PID:3056

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/624-136-0x00000273A5620000-0x00000273A5670000-memory.dmp

                Filesize

                320KB

              • memory/624-131-0x0000027388CA0000-0x0000027388CC2000-memory.dmp

                Filesize

                136KB

              • memory/624-133-0x00007FFCAAC30000-0x00007FFCAAE25000-memory.dmp

                Filesize

                2.0MB

              • memory/624-134-0x00007FFCAAC30000-0x00007FFCAAE25000-memory.dmp

                Filesize

                2.0MB

              • memory/624-135-0x00007FFC8BD50000-0x00007FFC8C811000-memory.dmp

                Filesize

                10.8MB

              • memory/624-130-0x0000027388820000-0x00000273888F2000-memory.dmp

                Filesize

                840KB

              • memory/624-132-0x00007FFC8BD50000-0x00007FFC8C811000-memory.dmp

                Filesize

                10.8MB