Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:07

General

  • Target

    df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806.exe

  • Size

    706KB

  • MD5

    4b7ee56888a0acd71058bf1f024c0af4

  • SHA1

    10372be5eff74427006c6313409a32949c4d1995

  • SHA256

    df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806

  • SHA512

    85bbd2c0ff4d8b72ca8dab0b6c10347c23284514d14b7ccdcba05adb61a9160e31d9768ceec3519caa4a9265ee26473d7d92e9763017b7463f652d2ca6b75c0f

  • SSDEEP

    12288:fcAZuLDjFjOf8XjkphHMumlJ/8P0kLAyIqdyLXAF9KxEzHLTTrm+pLFys8a3:qvNfQphsueJtkwXO9MELT3m+pd8a

Malware Config

Signatures

  • NirSoft MailPassView 7 IoCs

    Password recovery tool for various email clients

  • Nirsoft 14 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806.exe
    "C:\Users\Admin\AppData\Local\Temp\df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806.exe
      "C:\Users\Admin\AppData\Local\Temp\df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy /z "C:\Users\Admin\AppData\Local\Temp\df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806.exe"
        3⤵
        • Drops startup file
        PID:1900
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1668
        3⤵
          PID:316
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
          3⤵
            PID:1252
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
            3⤵
            • Accesses Microsoft Outlook accounts
            PID:1776
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:972
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:960
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c copy /z "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Acctres.exe"
                5⤵
                • Drops startup file
                PID:1436
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                dw20.exe -x -s 1712
                5⤵
                • Loads dropped DLL
                PID:520
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
                5⤵
                  PID:2040
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
                  5⤵
                  • Accesses Microsoft Outlook accounts
                  PID:568
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:1700

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

          Filesize

          706KB

          MD5

          4b7ee56888a0acd71058bf1f024c0af4

          SHA1

          10372be5eff74427006c6313409a32949c4d1995

          SHA256

          df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806

          SHA512

          85bbd2c0ff4d8b72ca8dab0b6c10347c23284514d14b7ccdcba05adb61a9160e31d9768ceec3519caa4a9265ee26473d7d92e9763017b7463f652d2ca6b75c0f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

          Filesize

          706KB

          MD5

          4b7ee56888a0acd71058bf1f024c0af4

          SHA1

          10372be5eff74427006c6313409a32949c4d1995

          SHA256

          df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806

          SHA512

          85bbd2c0ff4d8b72ca8dab0b6c10347c23284514d14b7ccdcba05adb61a9160e31d9768ceec3519caa4a9265ee26473d7d92e9763017b7463f652d2ca6b75c0f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

          Filesize

          706KB

          MD5

          4b7ee56888a0acd71058bf1f024c0af4

          SHA1

          10372be5eff74427006c6313409a32949c4d1995

          SHA256

          df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806

          SHA512

          85bbd2c0ff4d8b72ca8dab0b6c10347c23284514d14b7ccdcba05adb61a9160e31d9768ceec3519caa4a9265ee26473d7d92e9763017b7463f652d2ca6b75c0f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe

          Filesize

          9KB

          MD5

          3f9eb41226ad438b49d384cb08ce0126

          SHA1

          44024295715bd4847a29949d9a01a2b0a4671074

          SHA256

          dccd11c68485b58fbf705e191f3a93364a95e698e808d64fd6f643f4ad03b0e4

          SHA512

          0df9d94eedf480ad6918ebe011723d930c3bdaa43004de02bd1536a2e98fe9a559dde9ca099e7c4b994dfa55cb6edca3a8dcff3bc4a9ba71eb6e72caceeaa37b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe

          Filesize

          9KB

          MD5

          3f9eb41226ad438b49d384cb08ce0126

          SHA1

          44024295715bd4847a29949d9a01a2b0a4671074

          SHA256

          dccd11c68485b58fbf705e191f3a93364a95e698e808d64fd6f643f4ad03b0e4

          SHA512

          0df9d94eedf480ad6918ebe011723d930c3bdaa43004de02bd1536a2e98fe9a559dde9ca099e7c4b994dfa55cb6edca3a8dcff3bc4a9ba71eb6e72caceeaa37b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe

          Filesize

          9KB

          MD5

          3f9eb41226ad438b49d384cb08ce0126

          SHA1

          44024295715bd4847a29949d9a01a2b0a4671074

          SHA256

          dccd11c68485b58fbf705e191f3a93364a95e698e808d64fd6f643f4ad03b0e4

          SHA512

          0df9d94eedf480ad6918ebe011723d930c3bdaa43004de02bd1536a2e98fe9a559dde9ca099e7c4b994dfa55cb6edca3a8dcff3bc4a9ba71eb6e72caceeaa37b

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

          Filesize

          706KB

          MD5

          4b7ee56888a0acd71058bf1f024c0af4

          SHA1

          10372be5eff74427006c6313409a32949c4d1995

          SHA256

          df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806

          SHA512

          85bbd2c0ff4d8b72ca8dab0b6c10347c23284514d14b7ccdcba05adb61a9160e31d9768ceec3519caa4a9265ee26473d7d92e9763017b7463f652d2ca6b75c0f

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

          Filesize

          706KB

          MD5

          4b7ee56888a0acd71058bf1f024c0af4

          SHA1

          10372be5eff74427006c6313409a32949c4d1995

          SHA256

          df1e9c32dca0bfb46f837503fdfaf837c0f2422ab2e20e82bc728d192e069806

          SHA512

          85bbd2c0ff4d8b72ca8dab0b6c10347c23284514d14b7ccdcba05adb61a9160e31d9768ceec3519caa4a9265ee26473d7d92e9763017b7463f652d2ca6b75c0f

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe

          Filesize

          9KB

          MD5

          3f9eb41226ad438b49d384cb08ce0126

          SHA1

          44024295715bd4847a29949d9a01a2b0a4671074

          SHA256

          dccd11c68485b58fbf705e191f3a93364a95e698e808d64fd6f643f4ad03b0e4

          SHA512

          0df9d94eedf480ad6918ebe011723d930c3bdaa43004de02bd1536a2e98fe9a559dde9ca099e7c4b994dfa55cb6edca3a8dcff3bc4a9ba71eb6e72caceeaa37b

        • memory/316-77-0x0000000000000000-mapping.dmp

        • memory/520-138-0x0000000000000000-mapping.dmp

        • memory/568-167-0x0000000000411654-mapping.dmp

        • memory/568-171-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/960-136-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/960-142-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/960-128-0x000000000047057E-mapping.dmp

        • memory/972-86-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/972-116-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/972-83-0x0000000000000000-mapping.dmp

        • memory/1252-93-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1252-100-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1252-99-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1252-96-0x000000000040E758-mapping.dmp

        • memory/1252-95-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1252-87-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1252-88-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1252-90-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1252-92-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1356-63-0x000000000047057E-mapping.dmp

        • memory/1356-65-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1356-67-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1356-75-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1356-79-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1356-62-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1356-61-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1356-60-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1356-58-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1356-57-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1436-135-0x0000000000000000-mapping.dmp

        • memory/1700-118-0x0000000000000000-mapping.dmp

        • memory/1700-121-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1700-141-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1776-103-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-105-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-114-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-110-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-108-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-115-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-107-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-137-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1776-111-0x0000000000411654-mapping.dmp

        • memory/1776-102-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1780-54-0x00000000762F1000-0x00000000762F3000-memory.dmp

          Filesize

          8KB

        • memory/1780-56-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1780-55-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1900-72-0x0000000000000000-mapping.dmp

        • memory/1980-80-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1980-70-0x0000000000000000-mapping.dmp

        • memory/1980-76-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/1980-117-0x0000000074DE0000-0x000000007538B000-memory.dmp

          Filesize

          5.7MB

        • memory/2040-152-0x000000000040E758-mapping.dmp

        • memory/2040-155-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2040-156-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB