Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-09-2022 15:45
Behavioral task
behavioral1
Sample
3c319504f8c3cd2df7ca9642e2baf07c.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c319504f8c3cd2df7ca9642e2baf07c.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
3c319504f8c3cd2df7ca9642e2baf07c.exe
-
Size
436KB
-
MD5
3c319504f8c3cd2df7ca9642e2baf07c
-
SHA1
1dcbf401f7d66b19d8d5e1362e45a0642fd31226
-
SHA256
82b0930120afef192da8d6f7ae2275298986918eed55b4765a4ee665a23453d0
-
SHA512
58571bb15727a6281da5bca88de50479a79dee60e14a1d79fac69d6f0c03934f97018320b34487c2f8d340b2a8b8d4debd2c7e93ad3251306595fd84bdb221f2
-
SSDEEP
12288:ZWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:mxgsRftD0C2nKG
Score
6/10
Malware Config
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 PID 1680 wrote to memory of 1744 1680 3c319504f8c3cd2df7ca9642e2baf07c.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c319504f8c3cd2df7ca9642e2baf07c.exe"C:\Users\Admin\AppData\Local\Temp\3c319504f8c3cd2df7ca9642e2baf07c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1744
-