Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe
Resource
win10v2004-20220812-en
General
-
Target
59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe
-
Size
736KB
-
MD5
5db7313dfb1ebd6ad78e3940285113b8
-
SHA1
c383e2a146e9b18a2f1ec13ad209a0f332cb7a1a
-
SHA256
59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b
-
SHA512
01d4cd2817414b2d9624263fbd7406688e21aac6a034a6aac70b8834f7ce9f8ffbf5b36444c7aa045e8242e894dae835be57af4d24a44b8b092e12d7d7b21ad8
-
SSDEEP
12288:Ez9/32XvY6CD6zzXGytE0/OJKG+UlIKfJuUKo1nWjhStiSbUccDJIwsromw:o9vesuzzXGyO0/OJKiICuUKtYcwUccHb
Malware Config
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1832-100-0x0000000000400000-0x0000000000419000-memory.dmp MailPassView behavioral1/memory/1832-104-0x0000000000400000-0x0000000000419000-memory.dmp MailPassView behavioral1/memory/1832-102-0x000000000040F07A-mapping.dmp MailPassView -
Nirsoft 8 IoCs
resource yara_rule behavioral1/memory/1376-78-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1376-80-0x0000000000410F14-mapping.dmp Nirsoft behavioral1/memory/1376-82-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1832-100-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/1832-104-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/1832-102-0x000000000040F07A-mapping.dmp Nirsoft behavioral1/memory/1204-125-0x00000000004070E7-mapping.dmp Nirsoft behavioral1/memory/2000-147-0x000000000040A222-mapping.dmp Nirsoft -
resource yara_rule behavioral1/memory/1468-154-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1468 set thread context of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 set thread context of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 set thread context of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 set thread context of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1376 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe Token: SeDebugPrivilege 2000 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1376 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 27 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1832 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 28 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 1204 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 29 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30 PID 1468 wrote to memory of 2000 1468 59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe"C:\Users\Admin\AppData\Local\Temp\59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Accesses Microsoft Outlook accounts
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\59a7cdbb7c4debfbb421e461188d623162331fa7b40f2455cbe9798d2dceca3b.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2000
-