Analysis

  • max time kernel
    122s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2022, 21:14

General

  • Target

    tmp.exe

  • Size

    325KB

  • MD5

    19953ae3615b7bbd99f6e044907c5357

  • SHA1

    96d145b66bf42ef43000e927b05689160f4f8dec

  • SHA256

    db65770d0af225d1de49d059aabbb45c670931796b516e1564bab12fe4d99945

  • SHA512

    cd0fcb2c3a82080c2a148f26b9557d48271de766e811fe0ea91d761f93bda55e380c7a409109620affd73237a9af01d4b53fffe75b7080c64dd6bd67bc9e9938

  • SSDEEP

    6144:IfBOZLQF5Em5IO/ajmI3hRYZ77B/05qyyve1JqogCjM:qB8UF5Em5IAmO17Bc5qy6erxjM

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Windows\system32\rundll32.exe
      "C:\Users\Admin\AppData\Roaming\nsis_unse56fd41.dll",PrintUIEntry |5CQkOhiAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAOVkHwBs8|AtBWIAWv8AcAAwADUAdP8AVABZADYAQ68ATQBOPwBDLQJZ|0iD7CjoBAIA|wBIg8Qow8zM|8xMiUQkGEiJ|1QkEEiJTCQI|lkBSItEJDBIidsEJH0BOEhrAAhIb8dEJBAtAesOfQFfEEiDwAGLARB9AbdASDmSAHMlmwOL|wwkSAPISIvB10iLTKcBVHcAA9H|SIvKigmICOv9wWIFZUiLBCVg|vPwM8lIi1AYSP870XQ2SIPCIP9IiwJIO8J0Kv9mg3hIGHUaTP+LQFBmQYM4a7t0Bw0RS3UIDRB4|xAudAVIiwDrr9VIi0j5AMFmAED|U1VWV0FUQVXvQVZBV1kBZoE5|01aTYv4TIvyv0iL2Q+F|PPwTP9jSTxBgTwJUL9FAAAPherz8EHvi4QJiPPwhcBIv408AQ+E1mYRg3e8CYwtAQ+Ex|Pw|0SLZyBEi18c|4t3JESLTxhM|wPhTAPZSAPx|zPJRYXJD4Sk|vPwTYvEQYsQRf8z0kgD04oChP|AdB1BwcoND3u+wPYAAUQD0LsR|3XsQYH6qvwN|3x0DoPBAUmD|8AEQTvJc2nr|8aLwQ+3DE5F|4ssi0wD63RY+zPtphB0UUGLFP69ANMzyYoCTIvfwusPwcnEEQPI3uEQAUGKANEQ7TN|wDP2QTsMttwQ|qIAg8YBg|gIcv|u6wpIi8tB|3|VSYkE94PF4BB|xAQ7bxhyr2IB|0FfQV5BXUFc719eXVsvF0iB7PtgAWAAi+noZv7|||9IhcAPhJnWcSBMjasBiycQyDP3|+ibeSCNXwRM|41FQjPSi8v|91QkaHwgTIvgD+uEbHEgRaQQM8CLfdONIEiJfCQgoiD9cHwgSIvwD4RM|HEgoiBQSI1WCER|jUdASI2MJIERv0iL2Oh8|XogjatWSNogEN4hzPPw6P1n6yBEiwaNVwj0PSCiIFjGIYmEJIDagxLd8|CLDtYgWIljjCRtEQMwjSDoMesgv0yLXTqLrCkySPuLnBYyTIlkJDj|RI1nbEk77EjehiAwTIlcgAGEJE3cgxGGjuMh3yDwrBO|SIvT6Of8ATCK3ZxzMkiNhHMyQYD|8yFJi8xEMBj+oAKD6QF184G8|nMyIVJleHVKi3eEJPQeMZQk+PPw|wPCSDvocjVB|zvUdjBEjUlAP0kr1EG4AJQAoiA9QMYi+HQXRLQwvjHvSI1TbI0gTSvEu+hsgDBIi86iIHg|SIX|dBRMjDAXMX9IjUwkQLoD8|Cf|9dIgcRwIV0kAAEA
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:2908
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2908 -s 300
        3⤵
        • Program crash
        PID:3120
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 648
      2⤵
      • Program crash
      PID:2092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5056 -ip 5056
    1⤵
      PID:176
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 384 -p 2908 -ip 2908
      1⤵
        PID:3716

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\nsis_unse56fd41.dll

        Filesize

        58KB

        MD5

        664e46926466a2d4c9b87540f4853c39

        SHA1

        b172d1c2bde331770b0a944fcf6a9e2d75ded66b

        SHA256

        92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

        SHA512

        1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

      • C:\Users\Admin\AppData\Roaming\nsis_unse56fd41.dll

        Filesize

        58KB

        MD5

        664e46926466a2d4c9b87540f4853c39

        SHA1

        b172d1c2bde331770b0a944fcf6a9e2d75ded66b

        SHA256

        92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

        SHA512

        1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

      • memory/2908-141-0x000002486F4D0000-0x000002486F4D7000-memory.dmp

        Filesize

        28KB

      • memory/2908-149-0x0000000010000000-0x0000000010013000-memory.dmp

        Filesize

        76KB

      • memory/2908-148-0x00007FF3FFFE0000-0x00007FF4000DA000-memory.dmp

        Filesize

        1000KB

      • memory/2908-147-0x00007FF3FFFE0000-0x00007FF4000DA000-memory.dmp

        Filesize

        1000KB

      • memory/2908-142-0x00007FF3FFFE0000-0x00007FF4000DA000-memory.dmp

        Filesize

        1000KB

      • memory/5056-140-0x0000000004D70000-0x0000000005D70000-memory.dmp

        Filesize

        16.0MB

      • memory/5056-132-0x0000000002DD7000-0x0000000002DFD000-memory.dmp

        Filesize

        152KB

      • memory/5056-136-0x0000000003110000-0x000000000312D000-memory.dmp

        Filesize

        116KB

      • memory/5056-143-0x0000000002DD7000-0x0000000002DFD000-memory.dmp

        Filesize

        152KB

      • memory/5056-144-0x0000000002D90000-0x0000000002DC0000-memory.dmp

        Filesize

        192KB

      • memory/5056-145-0x0000000000400000-0x0000000002C3F000-memory.dmp

        Filesize

        40.2MB

      • memory/5056-146-0x0000000003110000-0x000000000312D000-memory.dmp

        Filesize

        116KB

      • memory/5056-135-0x00000000030D0000-0x00000000030EA000-memory.dmp

        Filesize

        104KB

      • memory/5056-134-0x0000000000400000-0x0000000002C3F000-memory.dmp

        Filesize

        40.2MB

      • memory/5056-133-0x0000000002D90000-0x0000000002DC0000-memory.dmp

        Filesize

        192KB