Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/09/2022, 07:27
Behavioral task
behavioral1
Sample
d192f0d7f70c0f0f57e2af7d87ae3000.exe
Resource
win7-20220812-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
d192f0d7f70c0f0f57e2af7d87ae3000.exe
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
d192f0d7f70c0f0f57e2af7d87ae3000.exe
-
Size
440KB
-
MD5
d192f0d7f70c0f0f57e2af7d87ae3000
-
SHA1
b7598c3c8754d21f5b34b7fc74ea4ff4053648a5
-
SHA256
51ccdddefb214c8c80d410f0872ad18d2d08d2396fc49e0d850086f2dd7f4583
-
SHA512
8e29d4929955b3362208c6ea8b819d5e3582ef017a28c7ff026d895b65d5ee9cd66fcfc310fa126cd9f56db0764e760406da1d07e2132c30464f76b49cdb5499
-
SSDEEP
12288:qWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmBZ:BxgsRftD0C2nKGP
Score
6/10
Malware Config
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1300 set thread context of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 PID 1300 wrote to memory of 1284 1300 d192f0d7f70c0f0f57e2af7d87ae3000.exe 26 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d192f0d7f70c0f0f57e2af7d87ae3000.exe"C:\Users\Admin\AppData\Local\Temp\d192f0d7f70c0f0f57e2af7d87ae3000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1284
-