Analysis
-
max time kernel
166s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 08:16
Static task
static1
Behavioral task
behavioral1
Sample
E1418893649007.PDF.exe
Resource
win7-20220718-en
General
-
Target
E1418893649007.PDF.exe
-
Size
1.1MB
-
MD5
21491189acd58edf2ffcc5829abbb7a6
-
SHA1
97439584bd72e0ea470085983cf18a02581b76b4
-
SHA256
712e38d6f7ec0cb09be6fea727a3748b2de1c7c8286b33bb227f68dca34b6073
-
SHA512
0f0cb57475a5ba07f00c8993febec95cb953b4d1b5f13229db9463e81e4cf584d15b8b1d58a3ffafb459baf0b67dda46efdb445b128ed0470784faef6b8cd716
Malware Config
Extracted
Protocol: ftp- Host:
ftp.trambaohanhelectroluxhn.com - Port:
21 - Username:
LOGGSS2022@suachuaduongongnuoc.net - Password:
Wn5b%iX[O%95
Signatures
-
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/3696-142-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral2/memory/4596-158-0x0000000000000000-mapping.dmp MailPassView behavioral2/memory/4596-159-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4596-161-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4596-162-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 7 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/3696-142-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral2/memory/616-164-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/616-163-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/616-166-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/616-167-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/616-168-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/616-170-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 11 IoCs
Processes:
resource yara_rule behavioral2/memory/3696-142-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral2/memory/4596-158-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/4596-159-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4596-161-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4596-162-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/616-164-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/616-163-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/616-166-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/616-167-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/616-168-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/616-170-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
E1418893649007.PDF.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation E1418893649007.PDF.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 44 whatismyipaddress.com 46 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
E1418893649007.PDF.exeE1418893649007.PDF.exedescription pid process target process PID 312 set thread context of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 3696 set thread context of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 set thread context of 616 3696 E1418893649007.PDF.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exevbc.exeE1418893649007.PDF.exepid process 1480 powershell.exe 1480 powershell.exe 616 vbc.exe 616 vbc.exe 3696 E1418893649007.PDF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeE1418893649007.PDF.exedescription pid process Token: SeDebugPrivilege 1480 powershell.exe Token: SeDebugPrivilege 3696 E1418893649007.PDF.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
E1418893649007.PDF.exeE1418893649007.PDF.exedescription pid process target process PID 312 wrote to memory of 1480 312 E1418893649007.PDF.exe powershell.exe PID 312 wrote to memory of 1480 312 E1418893649007.PDF.exe powershell.exe PID 312 wrote to memory of 1480 312 E1418893649007.PDF.exe powershell.exe PID 312 wrote to memory of 1496 312 E1418893649007.PDF.exe schtasks.exe PID 312 wrote to memory of 1496 312 E1418893649007.PDF.exe schtasks.exe PID 312 wrote to memory of 1496 312 E1418893649007.PDF.exe schtasks.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 312 wrote to memory of 3696 312 E1418893649007.PDF.exe E1418893649007.PDF.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 4596 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe PID 3696 wrote to memory of 616 3696 E1418893649007.PDF.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E1418893649007.PDF.exe"C:\Users\Admin\AppData\Local\Temp\E1418893649007.PDF.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QqCeeJqNyu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCAE1.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QqCeeJqNyu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\E1418893649007.PDF.exe"C:\Users\Admin\AppData\Local\Temp\E1418893649007.PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\E1418893649007.PDF.exe.logFilesize
1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
C:\Users\Admin\AppData\Local\Temp\holderwb.txtFilesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
C:\Users\Admin\AppData\Local\Temp\tmpCAE1.tmpFilesize
1KB
MD5ac000be7f73c35de359ec2f5ac30573f
SHA1ab61d2b38d127da978f74140a1c8d1b66251c071
SHA2568234a1f5e6e01cb238a5ca7489d8f9cc3ff5968bdb96971210e293e37eef6b4e
SHA512568f8af5fd32ec4d26501305531ff956382ee6cfc9095e3b6e403f3f5ca427ac5ebdd4c6823ddf59788001a289ef7a0e963631b36d20bddeff59d79a6b9130e6
-
memory/312-133-0x0000000004F30000-0x0000000004F3A000-memory.dmpFilesize
40KB
-
memory/312-134-0x000000000B120000-0x000000000B1BC000-memory.dmpFilesize
624KB
-
memory/312-135-0x000000000B1C0000-0x000000000B226000-memory.dmpFilesize
408KB
-
memory/312-130-0x0000000000480000-0x0000000000598000-memory.dmpFilesize
1.1MB
-
memory/312-132-0x0000000004FA0000-0x0000000005032000-memory.dmpFilesize
584KB
-
memory/312-131-0x00000000054B0000-0x0000000005A54000-memory.dmpFilesize
5.6MB
-
memory/616-170-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/616-168-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/616-167-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/616-166-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/616-163-0x0000000000000000-mapping.dmp
-
memory/616-164-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1480-149-0x0000000071400000-0x000000007144C000-memory.dmpFilesize
304KB
-
memory/1480-156-0x00000000075E0000-0x00000000075FA000-memory.dmpFilesize
104KB
-
memory/1480-147-0x0000000005F90000-0x0000000005FAE000-memory.dmpFilesize
120KB
-
memory/1480-145-0x00000000058E0000-0x0000000005946000-memory.dmpFilesize
408KB
-
memory/1480-150-0x0000000006550000-0x000000000656E000-memory.dmpFilesize
120KB
-
memory/1480-148-0x0000000006F50000-0x0000000006F82000-memory.dmpFilesize
200KB
-
memory/1480-152-0x00000000072A0000-0x00000000072BA000-memory.dmpFilesize
104KB
-
memory/1480-151-0x00000000078E0000-0x0000000007F5A000-memory.dmpFilesize
6.5MB
-
memory/1480-153-0x0000000007310000-0x000000000731A000-memory.dmpFilesize
40KB
-
memory/1480-154-0x0000000007520000-0x00000000075B6000-memory.dmpFilesize
600KB
-
memory/1480-155-0x00000000074D0000-0x00000000074DE000-memory.dmpFilesize
56KB
-
memory/1480-136-0x0000000000000000-mapping.dmp
-
memory/1480-157-0x00000000075C0000-0x00000000075C8000-memory.dmpFilesize
32KB
-
memory/1480-138-0x00000000049C0000-0x00000000049F6000-memory.dmpFilesize
216KB
-
memory/1480-140-0x0000000005180000-0x00000000057A8000-memory.dmpFilesize
6.2MB
-
memory/1480-144-0x0000000004FE0000-0x0000000005002000-memory.dmpFilesize
136KB
-
memory/1496-137-0x0000000000000000-mapping.dmp
-
memory/3696-141-0x0000000000000000-mapping.dmp
-
memory/3696-142-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/3696-146-0x00000000055F0000-0x0000000005646000-memory.dmpFilesize
344KB
-
memory/4596-162-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4596-161-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4596-159-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4596-158-0x0000000000000000-mapping.dmp