Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2022 22:22

General

  • Target

    a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe

  • Size

    747KB

  • MD5

    624efd0390a6b4fbc2d843d830c569b0

  • SHA1

    887b364d5dfdeb1d94bfbb26e906a7dafdc2008c

  • SHA256

    a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3

  • SHA512

    0db13973800062ed9483061fe48155cdbc79844d00a5c8c65405893a8f891bfb2dee01c42d2aec658f1acb0c43bd4a95de76b344cff6b5169c96e2b2a212a631

  • SSDEEP

    12288:SGV+hAV/4KicsXX3Ih5sm6RnP8dLssPQAutqEkVntPoM:zVdCXXppuYAFVntQ

Malware Config

Signatures

  • NirSoft MailPassView 5 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe
    "C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe
      "C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe
        "C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe
          "C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe" /stext C:\ProgramData\Mails.txt
          4⤵
          • Accesses Microsoft Outlook accounts
          PID:1200
        • C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe
          "C:\Users\Admin\AppData\Local\Temp\a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3.exe" /stext C:\ProgramData\Browsers.txt
          4⤵
            PID:1812
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            PID:732
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1980
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe" /stext C:\ProgramData\Browsers.txt
                6⤵
                • Executes dropped EXE
                PID:1652
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1616

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Browsers.txt

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

      Filesize

      10KB

      MD5

      a940b261ec4480bf5c5cdeb063d64b50

      SHA1

      a528f41956a077f99b9fca2dd862f9462bb08834

      SHA256

      a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

      SHA512

      d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

      Filesize

      10KB

      MD5

      a940b261ec4480bf5c5cdeb063d64b50

      SHA1

      a528f41956a077f99b9fca2dd862f9462bb08834

      SHA256

      a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

      SHA512

      d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

      Filesize

      10KB

      MD5

      a940b261ec4480bf5c5cdeb063d64b50

      SHA1

      a528f41956a077f99b9fca2dd862f9462bb08834

      SHA256

      a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

      SHA512

      d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

      Filesize

      10KB

      MD5

      a940b261ec4480bf5c5cdeb063d64b50

      SHA1

      a528f41956a077f99b9fca2dd862f9462bb08834

      SHA256

      a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

      SHA512

      d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

      Filesize

      747KB

      MD5

      624efd0390a6b4fbc2d843d830c569b0

      SHA1

      887b364d5dfdeb1d94bfbb26e906a7dafdc2008c

      SHA256

      a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3

      SHA512

      0db13973800062ed9483061fe48155cdbc79844d00a5c8c65405893a8f891bfb2dee01c42d2aec658f1acb0c43bd4a95de76b344cff6b5169c96e2b2a212a631

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

      Filesize

      747KB

      MD5

      624efd0390a6b4fbc2d843d830c569b0

      SHA1

      887b364d5dfdeb1d94bfbb26e906a7dafdc2008c

      SHA256

      a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3

      SHA512

      0db13973800062ed9483061fe48155cdbc79844d00a5c8c65405893a8f891bfb2dee01c42d2aec658f1acb0c43bd4a95de76b344cff6b5169c96e2b2a212a631

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

      Filesize

      747KB

      MD5

      624efd0390a6b4fbc2d843d830c569b0

      SHA1

      887b364d5dfdeb1d94bfbb26e906a7dafdc2008c

      SHA256

      a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3

      SHA512

      0db13973800062ed9483061fe48155cdbc79844d00a5c8c65405893a8f891bfb2dee01c42d2aec658f1acb0c43bd4a95de76b344cff6b5169c96e2b2a212a631

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

      Filesize

      747KB

      MD5

      624efd0390a6b4fbc2d843d830c569b0

      SHA1

      887b364d5dfdeb1d94bfbb26e906a7dafdc2008c

      SHA256

      a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3

      SHA512

      0db13973800062ed9483061fe48155cdbc79844d00a5c8c65405893a8f891bfb2dee01c42d2aec658f1acb0c43bd4a95de76b344cff6b5169c96e2b2a212a631

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

      Filesize

      747KB

      MD5

      624efd0390a6b4fbc2d843d830c569b0

      SHA1

      887b364d5dfdeb1d94bfbb26e906a7dafdc2008c

      SHA256

      a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3

      SHA512

      0db13973800062ed9483061fe48155cdbc79844d00a5c8c65405893a8f891bfb2dee01c42d2aec658f1acb0c43bd4a95de76b344cff6b5169c96e2b2a212a631

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

      Filesize

      10KB

      MD5

      a940b261ec4480bf5c5cdeb063d64b50

      SHA1

      a528f41956a077f99b9fca2dd862f9462bb08834

      SHA256

      a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

      SHA512

      d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

      Filesize

      10KB

      MD5

      a940b261ec4480bf5c5cdeb063d64b50

      SHA1

      a528f41956a077f99b9fca2dd862f9462bb08834

      SHA256

      a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

      SHA512

      d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

      Filesize

      747KB

      MD5

      624efd0390a6b4fbc2d843d830c569b0

      SHA1

      887b364d5dfdeb1d94bfbb26e906a7dafdc2008c

      SHA256

      a9c9e0b446774499b7b7d597d30633f3fd0c6859497471a84b3e9c7efe6e1ba3

      SHA512

      0db13973800062ed9483061fe48155cdbc79844d00a5c8c65405893a8f891bfb2dee01c42d2aec658f1acb0c43bd4a95de76b344cff6b5169c96e2b2a212a631

    • memory/732-156-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/732-135-0x000000000047DB9E-mapping.dmp

    • memory/1076-104-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1076-65-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/1076-63-0x000000000047DB9E-mapping.dmp

    • memory/1076-60-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/1076-61-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/1076-62-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/1076-67-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/1076-58-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/1076-57-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/1132-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

      Filesize

      8KB

    • memory/1132-127-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1132-56-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1132-55-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1200-98-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-86-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-95-0x0000000000411714-mapping.dmp

    • memory/1200-92-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-91-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-89-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-87-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-94-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-109-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1200-107-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1616-142-0x0000000000000000-mapping.dmp

    • memory/1616-183-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1616-186-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1652-181-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/1652-176-0x0000000000442F58-mapping.dmp

    • memory/1696-77-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1696-78-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1696-71-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1696-75-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1696-79-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1696-80-0x000000000047614E-mapping.dmp

    • memory/1696-125-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1696-84-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1696-82-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1696-106-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1812-121-0x0000000000080000-0x00000000000D9000-memory.dmp

      Filesize

      356KB

    • memory/1812-110-0x0000000000080000-0x00000000000D9000-memory.dmp

      Filesize

      356KB

    • memory/1812-117-0x0000000000080000-0x00000000000D9000-memory.dmp

      Filesize

      356KB

    • memory/1812-120-0x0000000000442F58-mapping.dmp

    • memory/1812-113-0x0000000000080000-0x00000000000D9000-memory.dmp

      Filesize

      356KB

    • memory/1812-111-0x0000000000080000-0x00000000000D9000-memory.dmp

      Filesize

      356KB

    • memory/1812-115-0x0000000000080000-0x00000000000D9000-memory.dmp

      Filesize

      356KB

    • memory/1872-108-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1872-101-0x0000000000000000-mapping.dmp

    • memory/1872-126-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1980-182-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1980-153-0x000000000047614E-mapping.dmp

    • memory/1980-185-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1984-124-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1984-105-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1984-128-0x0000000074800000-0x0000000074DAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1984-70-0x0000000000000000-mapping.dmp