Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2022 23:18
Static task
static1
Behavioral task
behavioral1
Sample
coppy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
coppy.exe
Resource
win10v2004-20220812-en
General
-
Target
coppy.exe
-
Size
1.1MB
-
MD5
57e39c48e784b3a979493e1945139cb7
-
SHA1
3074d590c3ffdf65c0516cf18d816da9978cb321
-
SHA256
5d5656bf50bf4d14a6b4129c7f3dfd9f446b98df3edeaf2d9036a77d49f52349
-
SHA512
d816fe98485feade6f968acdf5be92f71c77a12aba089ada7451f30e22c8f0a16cafe77bfa7bf7cb94e8dff822bb5c675b9937eb53bab9957f91e9961ac0df56
-
SSDEEP
24576:gVnc4FxHeu14NcBZODcHYZrq1MpGpPX6kUvZdEL:0nRFxHehNhDcRe+PavXEL
Malware Config
Extracted
Protocol: smtp- Host:
mail.michelethorne.com - Port:
587 - Username:
[email protected] - Password:
Goodplace1@1
Signatures
-
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1832-138-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral2/memory/3516-142-0x0000000000000000-mapping.dmp MailPassView behavioral2/memory/3516-143-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3516-145-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3516-146-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 6 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/1832-138-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral2/memory/4960-147-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/4960-148-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4960-150-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4960-151-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4960-153-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 10 IoCs
Processes:
resource yara_rule behavioral2/memory/1832-138-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral2/memory/3516-142-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/3516-143-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3516-145-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3516-146-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4960-147-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/4960-148-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4960-150-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4960-151-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4960-153-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
coppy.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" coppy.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 44 whatismyipaddress.com 42 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
coppy.execoppy.exedescription pid process target process PID 4416 set thread context of 1832 4416 coppy.exe coppy.exe PID 1832 set thread context of 3516 1832 coppy.exe vbc.exe PID 1832 set thread context of 4960 1832 coppy.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
coppy.exevbc.execoppy.exepid process 4416 coppy.exe 4416 coppy.exe 4960 vbc.exe 4960 vbc.exe 1832 coppy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
coppy.execoppy.exedescription pid process Token: SeDebugPrivilege 4416 coppy.exe Token: SeDebugPrivilege 1832 coppy.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
coppy.exepid process 1832 coppy.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
coppy.execoppy.exedescription pid process target process PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 4416 wrote to memory of 1832 4416 coppy.exe coppy.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 3516 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe PID 1832 wrote to memory of 4960 1832 coppy.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\coppy.exe"C:\Users\Admin\AppData\Local\Temp\coppy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\coppy.exe"C:\Users\Admin\AppData\Local\Temp\coppy.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:3516 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196