Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2022 01:16
Behavioral task
behavioral1
Sample
a79e9aff885b5aa305517c3836d10be1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a79e9aff885b5aa305517c3836d10be1.exe
Resource
win10v2004-20220812-en
General
-
Target
a79e9aff885b5aa305517c3836d10be1.exe
-
Size
440KB
-
MD5
a79e9aff885b5aa305517c3836d10be1
-
SHA1
a71d4faf5b3d863144d361129c4f52b6e66de27d
-
SHA256
1c5bf7e3edbccd4fe44d97baba8529438169f346769e109b2b660d1b45b2a02b
-
SHA512
d8d7f5ed21a3c76c6ffa430f44f964d76529fb31c6eb4a838b5b74265a5c989d239111b530fb3673358ef70fc0a51e6adb0630dca0fbfe72a66b9802d2d9fd4f
-
SSDEEP
12288:d8WnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:dnxgsRftD0C2nKG
Malware Config
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 4868 2220 a79e9aff885b5aa305517c3836d10be1.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 a79e9aff885b5aa305517c3836d10be1.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4868 2220 a79e9aff885b5aa305517c3836d10be1.exe 82 PID 2220 wrote to memory of 4868 2220 a79e9aff885b5aa305517c3836d10be1.exe 82 PID 2220 wrote to memory of 4868 2220 a79e9aff885b5aa305517c3836d10be1.exe 82 PID 2220 wrote to memory of 4868 2220 a79e9aff885b5aa305517c3836d10be1.exe 82 PID 2220 wrote to memory of 4868 2220 a79e9aff885b5aa305517c3836d10be1.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a79e9aff885b5aa305517c3836d10be1.exe"C:\Users\Admin\AppData\Local\Temp\a79e9aff885b5aa305517c3836d10be1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4868
-