Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2022, 07:27
Behavioral task
behavioral1
Sample
d192f0d7f70c0f0f57e2af7d87ae3000.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d192f0d7f70c0f0f57e2af7d87ae3000.exe
Resource
win10v2004-20220812-en
General
-
Target
d192f0d7f70c0f0f57e2af7d87ae3000.exe
-
Size
440KB
-
MD5
d192f0d7f70c0f0f57e2af7d87ae3000
-
SHA1
b7598c3c8754d21f5b34b7fc74ea4ff4053648a5
-
SHA256
51ccdddefb214c8c80d410f0872ad18d2d08d2396fc49e0d850086f2dd7f4583
-
SHA512
8e29d4929955b3362208c6ea8b819d5e3582ef017a28c7ff026d895b65d5ee9cd66fcfc310fa126cd9f56db0764e760406da1d07e2132c30464f76b49cdb5499
-
SSDEEP
12288:qWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmBZ:BxgsRftD0C2nKGP
Malware Config
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4132 set thread context of 508 4132 d192f0d7f70c0f0f57e2af7d87ae3000.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4132 d192f0d7f70c0f0f57e2af7d87ae3000.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4132 wrote to memory of 508 4132 d192f0d7f70c0f0f57e2af7d87ae3000.exe 82 PID 4132 wrote to memory of 508 4132 d192f0d7f70c0f0f57e2af7d87ae3000.exe 82 PID 4132 wrote to memory of 508 4132 d192f0d7f70c0f0f57e2af7d87ae3000.exe 82 PID 4132 wrote to memory of 508 4132 d192f0d7f70c0f0f57e2af7d87ae3000.exe 82 PID 4132 wrote to memory of 508 4132 d192f0d7f70c0f0f57e2af7d87ae3000.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d192f0d7f70c0f0f57e2af7d87ae3000.exe"C:\Users\Admin\AppData\Local\Temp\d192f0d7f70c0f0f57e2af7d87ae3000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:508
-