Analysis
-
max time kernel
161s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 08:54
Static task
static1
Behavioral task
behavioral1
Sample
7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe
Resource
win10v2004-20220722-en
General
-
Target
7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe
-
Size
739KB
-
MD5
8aa234bdb52dcf643971e8459e90bb12
-
SHA1
6a0d73e9b3447e2728deaf19739ee4ec8314843b
-
SHA256
7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d
-
SHA512
34a1e66c1949a7cb7f653cf9ec858c6a7bb207343d9f48b8243aee1ada43b10df6d706318aaf88e2089a0c16a6d7283975edfc4d0a68404f54c99f665db70f56
Malware Config
Signatures
-
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4888-150-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/4888-152-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/4888-153-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/4888-154-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4040-143-0x0000000000400000-0x000000000045C000-memory.dmp WebBrowserPassView behavioral2/memory/4040-145-0x0000000000400000-0x000000000045C000-memory.dmp WebBrowserPassView behavioral2/memory/4040-146-0x0000000000400000-0x000000000045C000-memory.dmp WebBrowserPassView behavioral2/memory/4040-147-0x0000000000400000-0x000000000045C000-memory.dmp WebBrowserPassView -
Nirsoft 8 IoCs
resource yara_rule behavioral2/memory/4040-143-0x0000000000400000-0x000000000045C000-memory.dmp Nirsoft behavioral2/memory/4040-145-0x0000000000400000-0x000000000045C000-memory.dmp Nirsoft behavioral2/memory/4040-146-0x0000000000400000-0x000000000045C000-memory.dmp Nirsoft behavioral2/memory/4040-147-0x0000000000400000-0x000000000045C000-memory.dmp Nirsoft behavioral2/memory/4888-150-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/4888-152-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/4888-153-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/4888-154-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3816 set thread context of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 1072 set thread context of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 set thread context of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4040 vbc.exe 4040 vbc.exe 4040 vbc.exe 4040 vbc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3816 wrote to memory of 4696 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 90 PID 3816 wrote to memory of 4696 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 90 PID 3816 wrote to memory of 4696 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 90 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 3816 wrote to memory of 1072 3816 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 92 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4040 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 97 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98 PID 1072 wrote to memory of 4888 1072 7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe"C:\Users\Admin\AppData\Local\Temp\7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pwwrSCNqpalIS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp23BB.tmp"2⤵
- Creates scheduled task(s)
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe"C:\Users\Admin\AppData\Local\Temp\7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp83CC.tmp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpA187.tmp"3⤵
- Accesses Microsoft Outlook accounts
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\7cd3cb34d306f4f74a31c3ef4ae82b2a29e7ad522ebd39ba6bf4e7c1fdf8409d.exe.log
Filesize405B
MD5bb02d2315b8c3d46390cc8852c350909
SHA1c7eb57165fb7be0cec9a282a56449d35a3e39a53
SHA2566b04fbf03b5064dc32c8cbc7e5f125339ca297622487ed4269da381fa50b7290
SHA512e395ec8866c9ba864bd59bfb84a88538a053740d66e2fa83926597b2e4b357a55f794c5b39c5ae43353f4debc865ec6b4c60494da32a10e643582b6ae130d080
-
Filesize
1KB
MD5f0e20921e3ee2fece56d0c77cca2b1b4
SHA1c81d7a42d7215f91ccb76dbef1feae65b6083816
SHA256612c343aeb7bb4d3ebbf78125402976d48beb84ef41f793caf9e19222f24c9bb
SHA512d99c5c29627e2b65f14755d98b0fbb1b823e526e3aa6386e8ca18093c8ac67668dea04fbf620f147dd41d0dedd02e2bceda2cb2cd9a8507ecedf031e0adaa903
-
Filesize
4KB
MD5508d12363b937319e4dbfc174a10ecba
SHA1edb7ae72b83074621bc83e12d79e6ec91b28952e
SHA2562e4b211b03ba5a4b727a3bdeb55afc31be43ca8605fe7189fb755befa4f4e061
SHA512384f33d45223f2428c80e465ecae7e15a0dc348d2421d4ede7e01e77358e8e6eadcb8002227b9577c2ee1071199267c21a5e35554fc773d4d9f583bff0265e15