Analysis

  • max time kernel
    54s
  • max time network
    176s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/09/2022, 22:15

General

  • Target

    2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef.exe

  • Size

    6.2MB

  • MD5

    cf0c5cf9569f64fd46d3303ab892e467

  • SHA1

    d5bf04b97ed664f1b72261affdf230bfcd3cbe9c

  • SHA256

    2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef

  • SHA512

    20878d508aa3f0be002bf5d086c13bd05c4407dfa643f15058e719ceeac9229af9369cc86e8c596ea6a338b48a672ef909bde20afc67be1d45afe098dc45c8ca

  • SSDEEP

    49152:xu9DG/n7dDOkWRaxQSPs+bZMmWIm5CyIsapfNdcNH1t8jTMJSdWM07v+BMWf1xZc:OG/7hNzxhL+mWW3je+WJjWfLZnl3d5

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef.exe
    "C:\Users\Admin\AppData\Local\Temp\2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:3408
      • C:\Windows\system32\rundll32.exe
        "C:\Users\Admin\AppData\Roaming\nsis_unse5741cc.dll",PrintUIEntry |5CQkOhiAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAOVkHwBs8|AtBXoAV|8AawBSADEAMP8AZgBNAFoASP8ASQBGAHAAOP4tAllIg+wo6AT|AgAASIPEKMP|zMzMTIlEJBj|SIlUJBBIiUz7JAhZAUiLRCQwb0iJBCR9AThIawC|CEjHRCQQLQHrfQ59ARBIg8ABiwHdEH0BQEg5kgBzJf6bA4sMJEgDyEhfi8FIi0ynAVR3AP8D0UiLyooJiPcI68FiBWVIiwT7JWDz8DPJSItQ|xhIO9F0NkiD|8IgSIsCSDvC|3QqZoN4SBh1|xpMi0BQZkGD7zhrdAcNEUt1CP4NEHgQLnQFSIu|AOvVSItI+QDB|mYAQFNVVldBVL9BVUFWQVdZAWb|gTlNWk2L+Ez|i|JIi9kPhfz+8|BMY0k8QYE8|wlQRQAAD4XqvvPwQYuECYjz8IX|wEiNPAEPhNbeZhGDvAmMLQEPhP3H8|BEi2cgRIv|XxyLdyREi0||GEwD4UwD2Uj|A|EzyUWFyQ|7hKTz8E2LxEGL|xBFM9JIA9OK|wKEwHQdQcHK7w0PvsD2AAFEA|3QuxF17EGB+qr||A18dA6DwQH|SYPABEE7yXP|aevGi8EPtwz|TkWLLItMA+vvdFgz7aYQdFFB+4sUvQDTM8mKAn9Mi8LrD8HJxBF7A8jhEAFBigDREP|tM8Az9kE7DPm23BCiAIPGAYP4|why7usKSIvL|0H|1UmJBPeD|cXgEMQEO28Ycv2vYgFBX0FeQV2|QVxfXl1bLxdI74HsYAFgAIvp6P9m|v||SIXAD1uEmXEgTI2rAYsnEN|IM||om3kgjV||BEyNRUIz0ovfy|9UJGh8IEyLr+APhGxxIEWkEDP3wIvTjSBIiXwk9SCiIHB8IEiL8A|zhExxIKIgUEiNVv8IRI1HQEiNjP0kgRFIi9jofP2ueiCNVkjaIBDeIcz28|DoZ+sgRIsGjdNXCD0goiBYxiGJhGskgIMS3fPwiw7WII9YiYwkbREDMI0g6P0x6yBMi106i6zuKTJIi5wWMkyJZP8kOESNZ2xJO3vsSIYgMEyJXIABN4Qk3IMRho7jId8g|fCsE0iL0+jn|HYBMIqcczJIjYRzMv9BgPMhSYvMRPswGKACg+kBdfP7gbxzMiFSZXh130qLhCT0HjGUJP348|ADwkg76HL|NUE71HYwRI3|SUBJK9RBuAD0lACiIEDGIvh0F0S8tDC+MUiNU2yNIE3vK8TobIAwSIvO|qIgeEiF|3QUTPyMMBcxSI1MJEC6fQPz8P|XSIHEcCEGXSQAAA==
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4140
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 4140 -s 932
          4⤵
          • Program crash
          PID:3048

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\nsis_unse5741cc.dll

          Filesize

          58KB

          MD5

          664e46926466a2d4c9b87540f4853c39

          SHA1

          b172d1c2bde331770b0a944fcf6a9e2d75ded66b

          SHA256

          92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

          SHA512

          1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

        • \Users\Admin\AppData\Roaming\nsis_unse5741cc.dll

          Filesize

          58KB

          MD5

          664e46926466a2d4c9b87540f4853c39

          SHA1

          b172d1c2bde331770b0a944fcf6a9e2d75ded66b

          SHA256

          92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

          SHA512

          1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

        • memory/2344-161-0x0000000004520000-0x0000000004B5D000-memory.dmp

          Filesize

          6.2MB

        • memory/2344-164-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-122-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-123-0x0000000000400000-0x0000000001418000-memory.dmp

          Filesize

          16.1MB

        • memory/2344-124-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-125-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-126-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-127-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-128-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-129-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-130-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-131-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-132-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-133-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-134-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-135-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-136-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-137-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-120-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-139-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-140-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-141-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-142-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-143-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-144-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-145-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-146-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-147-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-148-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-149-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-150-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-151-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-152-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-153-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-154-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-155-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-156-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-157-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-158-0x000000007FAD0000-0x000000007FEA1000-memory.dmp

          Filesize

          3.8MB

        • memory/2344-159-0x0000000000400000-0x0000000001418000-memory.dmp

          Filesize

          16.1MB

        • memory/2344-138-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-121-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-180-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-165-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-166-0x0000000004B60000-0x0000000004CE9000-memory.dmp

          Filesize

          1.5MB

        • memory/2344-167-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-168-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-169-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-170-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-171-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-172-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-173-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-174-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-175-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-176-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-177-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-178-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-179-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-162-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-181-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2344-182-0x000000000D530000-0x000000000D7C8000-memory.dmp

          Filesize

          2.6MB

        • memory/2344-183-0x0000000004520000-0x0000000004B5D000-memory.dmp

          Filesize

          6.2MB

        • memory/2344-184-0x000000000D530000-0x000000000D7C8000-memory.dmp

          Filesize

          2.6MB

        • memory/2344-196-0x0000000000400000-0x0000000001418000-memory.dmp

          Filesize

          16.1MB

        • memory/3408-241-0x0000000003330000-0x0000000004330000-memory.dmp

          Filesize

          16.0MB

        • memory/3408-247-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3408-232-0x00000000013B0000-0x00000000013CD000-memory.dmp

          Filesize

          116KB

        • memory/3408-189-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3408-190-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3408-191-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3408-192-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3408-185-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3408-187-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3408-224-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3408-188-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3408-248-0x00000000013B0000-0x00000000013CD000-memory.dmp

          Filesize

          116KB

        • memory/4140-245-0x0000017EC2CB0000-0x0000017EC2CB7000-memory.dmp

          Filesize

          28KB

        • memory/4140-246-0x00007FF655EE0000-0x00007FF655FD3000-memory.dmp

          Filesize

          972KB

        • memory/4140-249-0x00007FF655EE0000-0x00007FF655FD3000-memory.dmp

          Filesize

          972KB

        • memory/4140-250-0x0000000010000000-0x0000000010013000-memory.dmp

          Filesize

          76KB

        • memory/4140-251-0x00007FF655EE0000-0x00007FF655FD3000-memory.dmp

          Filesize

          972KB