Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2022, 23:55

General

  • Target

    f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe

  • Size

    626KB

  • MD5

    b8b4e23bef6680bb4f36af3a7d820b24

  • SHA1

    e725da4a8a2d5b8f0fe7b214625f473c793a3b94

  • SHA256

    f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89

  • SHA512

    04cf97efa98fced5b8c48cf42681852d466858a6851e96fdb9fdaadfd769fd70521f66dbaabdbfd3fdd270ea933d487d69432219c00fc918555527d9170edbc6

  • SSDEEP

    12288:IDyLu+6UozqxxVEBJD67GnwLQVoFRo58dZNUoPpdgm8nMwiTuOy:IDyS0xxV+JSGnwLBFLTPpN8nMwiSOy

Malware Config

Signatures

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe
    "C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"
      2⤵
        PID:4548
      • C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe
        "C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe
          "C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe" /stext C:\ProgramData\Mails.txt
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1188
        • C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe
          "C:\Users\Admin\AppData\Local\Temp\f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89.exe" /stext C:\ProgramData\Browsers.txt
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2628
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4000
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f
              5⤵
                PID:2520
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"
              4⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3008
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:4768
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1408
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5052

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Browsers.txt

        Filesize

        3KB

        MD5

        f94dc819ca773f1e3cb27abbc9e7fa27

        SHA1

        9a7700efadc5ea09ab288544ef1e3cd876255086

        SHA256

        a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

        SHA512

        72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\natsv.exe.log

        Filesize

        128B

        MD5

        a5dcc7c9c08af7dddd82be5b036a4416

        SHA1

        4f998ca1526d199e355ffb435bae111a2779b994

        SHA256

        e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5

        SHA512

        56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe

        Filesize

        626KB

        MD5

        b8b4e23bef6680bb4f36af3a7d820b24

        SHA1

        e725da4a8a2d5b8f0fe7b214625f473c793a3b94

        SHA256

        f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89

        SHA512

        04cf97efa98fced5b8c48cf42681852d466858a6851e96fdb9fdaadfd769fd70521f66dbaabdbfd3fdd270ea933d487d69432219c00fc918555527d9170edbc6

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe

        Filesize

        626KB

        MD5

        b8b4e23bef6680bb4f36af3a7d820b24

        SHA1

        e725da4a8a2d5b8f0fe7b214625f473c793a3b94

        SHA256

        f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89

        SHA512

        04cf97efa98fced5b8c48cf42681852d466858a6851e96fdb9fdaadfd769fd70521f66dbaabdbfd3fdd270ea933d487d69432219c00fc918555527d9170edbc6

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe

        Filesize

        626KB

        MD5

        b8b4e23bef6680bb4f36af3a7d820b24

        SHA1

        e725da4a8a2d5b8f0fe7b214625f473c793a3b94

        SHA256

        f118befe8f6796fa3972cbf51b688b24799df50c53cdbb70334c3541d7d8ed89

        SHA512

        04cf97efa98fced5b8c48cf42681852d466858a6851e96fdb9fdaadfd769fd70521f66dbaabdbfd3fdd270ea933d487d69432219c00fc918555527d9170edbc6

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe

        Filesize

        19KB

        MD5

        709b06bb9909f9b36994e7420b187893

        SHA1

        07855e0d08a9f600282d935d6f91527cd52457fe

        SHA256

        f45777b61c3d2a2534fdc59bc4c500bd33e74083de5f4df2ce964a53f2cc68b0

        SHA512

        fcb8ff967ecafb533d298a4ed2138cd6a3287eb93c3d7e5e00581cdae651f2b4004f89347a21f4e6699433282c5370a8698a5a80265d8d834a0669a907d518b8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe

        Filesize

        19KB

        MD5

        709b06bb9909f9b36994e7420b187893

        SHA1

        07855e0d08a9f600282d935d6f91527cd52457fe

        SHA256

        f45777b61c3d2a2534fdc59bc4c500bd33e74083de5f4df2ce964a53f2cc68b0

        SHA512

        fcb8ff967ecafb533d298a4ed2138cd6a3287eb93c3d7e5e00581cdae651f2b4004f89347a21f4e6699433282c5370a8698a5a80265d8d834a0669a907d518b8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe

        Filesize

        19KB

        MD5

        709b06bb9909f9b36994e7420b187893

        SHA1

        07855e0d08a9f600282d935d6f91527cd52457fe

        SHA256

        f45777b61c3d2a2534fdc59bc4c500bd33e74083de5f4df2ce964a53f2cc68b0

        SHA512

        fcb8ff967ecafb533d298a4ed2138cd6a3287eb93c3d7e5e00581cdae651f2b4004f89347a21f4e6699433282c5370a8698a5a80265d8d834a0669a907d518b8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe

        Filesize

        19KB

        MD5

        709b06bb9909f9b36994e7420b187893

        SHA1

        07855e0d08a9f600282d935d6f91527cd52457fe

        SHA256

        f45777b61c3d2a2534fdc59bc4c500bd33e74083de5f4df2ce964a53f2cc68b0

        SHA512

        fcb8ff967ecafb533d298a4ed2138cd6a3287eb93c3d7e5e00581cdae651f2b4004f89347a21f4e6699433282c5370a8698a5a80265d8d834a0669a907d518b8

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

        Filesize

        514B

        MD5

        759dd1a3528f89ddca72040d8bf9264a

        SHA1

        311e4a971469847d99c6627bc59a4914ddbd60a4

        SHA256

        55db12098043e6237c7ef625d01b43fa8782200f8b59ac21f98b7113fa39ba81

        SHA512

        753219dece7e4a1eb284dcbf78902776b1f7e51fa09efd3bc1d07f287d97c466089fe86b1f189557575118a47bb70fbe989b7b02cd4573814e52b722f68d0529

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

        Filesize

        514B

        MD5

        759dd1a3528f89ddca72040d8bf9264a

        SHA1

        311e4a971469847d99c6627bc59a4914ddbd60a4

        SHA256

        55db12098043e6237c7ef625d01b43fa8782200f8b59ac21f98b7113fa39ba81

        SHA512

        753219dece7e4a1eb284dcbf78902776b1f7e51fa09efd3bc1d07f287d97c466089fe86b1f189557575118a47bb70fbe989b7b02cd4573814e52b722f68d0529

      • memory/1188-139-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1188-144-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1188-149-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1188-154-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2076-146-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/2076-176-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/2628-161-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/2628-157-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/2628-162-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/2628-151-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3008-158-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/3008-177-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/4000-159-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/4000-147-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/4768-170-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/4768-165-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/4768-178-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/5000-132-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/5000-133-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/5000-160-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/5052-175-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/5052-179-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB