Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:41

General

  • Target

    8f8013947ab178588588fe7505cdea3514b2c7494a3cd6e0b61717b5395699cd.exe

  • Size

    1.8MB

  • MD5

    2d0545afe968c261aabb2bc60eed6f99

  • SHA1

    45a7fc5a434c2bce192c42d4f1861ffdcf04bfad

  • SHA256

    8f8013947ab178588588fe7505cdea3514b2c7494a3cd6e0b61717b5395699cd

  • SHA512

    10638a7aaa071c44b556242fba82f95eb1b005a9cc41ff2f168a0357b5e1b95f61de13bafa4fb3f8ae98e2c0ebf72b41097a007bd202a56d0020d5a06fb891d6

  • SSDEEP

    49152:tkiXmqBxMJ2i14eBT+BBrCYIFeC5jEwSsQs54uEe:W4txMJ714eh+b2Fpu+QCUe

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
    • C:\Users\Admin\AppData\Local\Temp\8f8013947ab178588588fe7505cdea3514b2c7494a3cd6e0b61717b5395699cd.exe
      "C:\Users\Admin\AppData\Local\Temp\8f8013947ab178588588fe7505cdea3514b2c7494a3cd6e0b61717b5395699cd.exe"
      1⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\0906490.bat" "
        2⤵
          PID:276
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          2⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul
            3⤵
              PID:684
          • C:\Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe
            "C:\Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:832
            • C:\Users\Admin\AppData\Local\Temp\is-ENN4O.tmp\tvplayer4.9.1.0.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-ENN4O.tmp\tvplayer4.9.1.0.tmp" /SL5="$D0158,1419068,53248,C:\Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1220
          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
            "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
            2⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_win_path
            PID:868

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\0906490.bat

          Filesize

          15B

          MD5

          941e66c908cabb0f803f68c5549ad4f8

          SHA1

          3cb78031b511cd2a972ae6290f3febb2abbc546a

          SHA256

          66e83aff0c39680bef61da943685e3077e605769be17c781c398fff6c712f15e

          SHA512

          7575483ce0a8a1fb95bdd0c077840f56740b2e69297a67ae04ab04e283f184a1b8efde46ec4eeeadee041b3c751d9d11ab95963fbeb55ef70b3dffdb27ec545a

        • C:\Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          71KB

          MD5

          336e0cc8b4f22ee67c087f8df948b987

          SHA1

          7bf87db059e3a93a0f317b3ecc5661beeef85efd

          SHA256

          f642df1f8f32627d072639b46d8d942aded99d50ab438fcda45e16ed181d5cfb

          SHA512

          8cd546f3ad43e5003eea9f765037568d3d9ec12b05a72f317ce405c9698f794085fbee065a51b5ba9f3c2b0fbd30468b9f0047173217ceb54f02b16914e5c93f

        • C:\Users\Admin\AppData\Local\Temp\is-ENN4O.tmp\tvplayer4.9.1.0.tmp

          Filesize

          669KB

          MD5

          52950ac9e2b481453082f096120e355a

          SHA1

          159c09db1abcee9114b4f792ffba255c78a6e6c3

          SHA256

          25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

          SHA512

          5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

        • C:\Users\Admin\AppData\Local\Temp\is-ENN4O.tmp\tvplayer4.9.1.0.tmp

          Filesize

          669KB

          MD5

          52950ac9e2b481453082f096120e355a

          SHA1

          159c09db1abcee9114b4f792ffba255c78a6e6c3

          SHA256

          25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

          SHA512

          5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          49KB

          MD5

          534517313f621212fe89551656b15118

          SHA1

          aa8cab2f141d7b84d81b44b7669407f1c6a2283e

          SHA256

          af38ba08a9acd1b187ac8a2ac34f305f5a87f5ced4eeda1a8784766374379870

          SHA512

          c2d127c36aa6c7bff3683f2a4c866c7dfdc7d9b916038437b408fe665c2315434371f337ab1df16380156f7b4cfedf5e3aa79e62d64164ab63fb463fe916858b

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          49KB

          MD5

          534517313f621212fe89551656b15118

          SHA1

          aa8cab2f141d7b84d81b44b7669407f1c6a2283e

          SHA256

          af38ba08a9acd1b187ac8a2ac34f305f5a87f5ced4eeda1a8784766374379870

          SHA512

          c2d127c36aa6c7bff3683f2a4c866c7dfdc7d9b916038437b408fe665c2315434371f337ab1df16380156f7b4cfedf5e3aa79e62d64164ab63fb463fe916858b

        • C:\Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe

          Filesize

          1.6MB

          MD5

          12a563c9ab7a12cf938f9e938cd08010

          SHA1

          b4d76d55be6cc42a1ae285719414e14449c08659

          SHA256

          55277060fe533cfd68c8d03c2e9b206333bd5b83724e3287a7b232f293202bae

          SHA512

          7605cb0ffe6d48ceac6816b2d399484fb2531ff8e7b38e0375a4e523b50c17b00c1ff0c1ea195c842ff2bba8b273547058bd43cedcec33dd112b13348ff0399a

        • C:\Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe

          Filesize

          1.6MB

          MD5

          12a563c9ab7a12cf938f9e938cd08010

          SHA1

          b4d76d55be6cc42a1ae285719414e14449c08659

          SHA256

          55277060fe533cfd68c8d03c2e9b206333bd5b83724e3287a7b232f293202bae

          SHA512

          7605cb0ffe6d48ceac6816b2d399484fb2531ff8e7b38e0375a4e523b50c17b00c1ff0c1ea195c842ff2bba8b273547058bd43cedcec33dd112b13348ff0399a

        • \Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          71KB

          MD5

          336e0cc8b4f22ee67c087f8df948b987

          SHA1

          7bf87db059e3a93a0f317b3ecc5661beeef85efd

          SHA256

          f642df1f8f32627d072639b46d8d942aded99d50ab438fcda45e16ed181d5cfb

          SHA512

          8cd546f3ad43e5003eea9f765037568d3d9ec12b05a72f317ce405c9698f794085fbee065a51b5ba9f3c2b0fbd30468b9f0047173217ceb54f02b16914e5c93f

        • \Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          71KB

          MD5

          336e0cc8b4f22ee67c087f8df948b987

          SHA1

          7bf87db059e3a93a0f317b3ecc5661beeef85efd

          SHA256

          f642df1f8f32627d072639b46d8d942aded99d50ab438fcda45e16ed181d5cfb

          SHA512

          8cd546f3ad43e5003eea9f765037568d3d9ec12b05a72f317ce405c9698f794085fbee065a51b5ba9f3c2b0fbd30468b9f0047173217ceb54f02b16914e5c93f

        • \Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          71KB

          MD5

          336e0cc8b4f22ee67c087f8df948b987

          SHA1

          7bf87db059e3a93a0f317b3ecc5661beeef85efd

          SHA256

          f642df1f8f32627d072639b46d8d942aded99d50ab438fcda45e16ed181d5cfb

          SHA512

          8cd546f3ad43e5003eea9f765037568d3d9ec12b05a72f317ce405c9698f794085fbee065a51b5ba9f3c2b0fbd30468b9f0047173217ceb54f02b16914e5c93f

        • \Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          71KB

          MD5

          336e0cc8b4f22ee67c087f8df948b987

          SHA1

          7bf87db059e3a93a0f317b3ecc5661beeef85efd

          SHA256

          f642df1f8f32627d072639b46d8d942aded99d50ab438fcda45e16ed181d5cfb

          SHA512

          8cd546f3ad43e5003eea9f765037568d3d9ec12b05a72f317ce405c9698f794085fbee065a51b5ba9f3c2b0fbd30468b9f0047173217ceb54f02b16914e5c93f

        • \Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          71KB

          MD5

          336e0cc8b4f22ee67c087f8df948b987

          SHA1

          7bf87db059e3a93a0f317b3ecc5661beeef85efd

          SHA256

          f642df1f8f32627d072639b46d8d942aded99d50ab438fcda45e16ed181d5cfb

          SHA512

          8cd546f3ad43e5003eea9f765037568d3d9ec12b05a72f317ce405c9698f794085fbee065a51b5ba9f3c2b0fbd30468b9f0047173217ceb54f02b16914e5c93f

        • \Users\Admin\AppData\Local\Temp\is-79JQU.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-79JQU.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-ENN4O.tmp\tvplayer4.9.1.0.tmp

          Filesize

          669KB

          MD5

          52950ac9e2b481453082f096120e355a

          SHA1

          159c09db1abcee9114b4f792ffba255c78a6e6c3

          SHA256

          25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

          SHA512

          5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          49KB

          MD5

          534517313f621212fe89551656b15118

          SHA1

          aa8cab2f141d7b84d81b44b7669407f1c6a2283e

          SHA256

          af38ba08a9acd1b187ac8a2ac34f305f5a87f5ced4eeda1a8784766374379870

          SHA512

          c2d127c36aa6c7bff3683f2a4c866c7dfdc7d9b916038437b408fe665c2315434371f337ab1df16380156f7b4cfedf5e3aa79e62d64164ab63fb463fe916858b

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          49KB

          MD5

          534517313f621212fe89551656b15118

          SHA1

          aa8cab2f141d7b84d81b44b7669407f1c6a2283e

          SHA256

          af38ba08a9acd1b187ac8a2ac34f305f5a87f5ced4eeda1a8784766374379870

          SHA512

          c2d127c36aa6c7bff3683f2a4c866c7dfdc7d9b916038437b408fe665c2315434371f337ab1df16380156f7b4cfedf5e3aa79e62d64164ab63fb463fe916858b

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          49KB

          MD5

          534517313f621212fe89551656b15118

          SHA1

          aa8cab2f141d7b84d81b44b7669407f1c6a2283e

          SHA256

          af38ba08a9acd1b187ac8a2ac34f305f5a87f5ced4eeda1a8784766374379870

          SHA512

          c2d127c36aa6c7bff3683f2a4c866c7dfdc7d9b916038437b408fe665c2315434371f337ab1df16380156f7b4cfedf5e3aa79e62d64164ab63fb463fe916858b

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          49KB

          MD5

          534517313f621212fe89551656b15118

          SHA1

          aa8cab2f141d7b84d81b44b7669407f1c6a2283e

          SHA256

          af38ba08a9acd1b187ac8a2ac34f305f5a87f5ced4eeda1a8784766374379870

          SHA512

          c2d127c36aa6c7bff3683f2a4c866c7dfdc7d9b916038437b408fe665c2315434371f337ab1df16380156f7b4cfedf5e3aa79e62d64164ab63fb463fe916858b

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          49KB

          MD5

          534517313f621212fe89551656b15118

          SHA1

          aa8cab2f141d7b84d81b44b7669407f1c6a2283e

          SHA256

          af38ba08a9acd1b187ac8a2ac34f305f5a87f5ced4eeda1a8784766374379870

          SHA512

          c2d127c36aa6c7bff3683f2a4c866c7dfdc7d9b916038437b408fe665c2315434371f337ab1df16380156f7b4cfedf5e3aa79e62d64164ab63fb463fe916858b

        • \Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe

          Filesize

          1.6MB

          MD5

          12a563c9ab7a12cf938f9e938cd08010

          SHA1

          b4d76d55be6cc42a1ae285719414e14449c08659

          SHA256

          55277060fe533cfd68c8d03c2e9b206333bd5b83724e3287a7b232f293202bae

          SHA512

          7605cb0ffe6d48ceac6816b2d399484fb2531ff8e7b38e0375a4e523b50c17b00c1ff0c1ea195c842ff2bba8b273547058bd43cedcec33dd112b13348ff0399a

        • \Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe

          Filesize

          1.6MB

          MD5

          12a563c9ab7a12cf938f9e938cd08010

          SHA1

          b4d76d55be6cc42a1ae285719414e14449c08659

          SHA256

          55277060fe533cfd68c8d03c2e9b206333bd5b83724e3287a7b232f293202bae

          SHA512

          7605cb0ffe6d48ceac6816b2d399484fb2531ff8e7b38e0375a4e523b50c17b00c1ff0c1ea195c842ff2bba8b273547058bd43cedcec33dd112b13348ff0399a

        • \Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe

          Filesize

          1.6MB

          MD5

          12a563c9ab7a12cf938f9e938cd08010

          SHA1

          b4d76d55be6cc42a1ae285719414e14449c08659

          SHA256

          55277060fe533cfd68c8d03c2e9b206333bd5b83724e3287a7b232f293202bae

          SHA512

          7605cb0ffe6d48ceac6816b2d399484fb2531ff8e7b38e0375a4e523b50c17b00c1ff0c1ea195c842ff2bba8b273547058bd43cedcec33dd112b13348ff0399a

        • \Users\Admin\AppData\Local\Temp\tvplayer4.9.1.0.exe

          Filesize

          1.6MB

          MD5

          12a563c9ab7a12cf938f9e938cd08010

          SHA1

          b4d76d55be6cc42a1ae285719414e14449c08659

          SHA256

          55277060fe533cfd68c8d03c2e9b206333bd5b83724e3287a7b232f293202bae

          SHA512

          7605cb0ffe6d48ceac6816b2d399484fb2531ff8e7b38e0375a4e523b50c17b00c1ff0c1ea195c842ff2bba8b273547058bd43cedcec33dd112b13348ff0399a

        • memory/276-55-0x0000000000000000-mapping.dmp

        • memory/684-94-0x0000000000000000-mapping.dmp

        • memory/832-87-0x0000000000000000-mapping.dmp

        • memory/832-93-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/832-108-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/868-69-0x0000000000000000-mapping.dmp

        • memory/868-109-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/868-82-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/868-107-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/1064-96-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/1064-88-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/1064-77-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/1064-61-0x0000000000000000-mapping.dmp

        • memory/1064-97-0x00000000001B0000-0x00000000001B4000-memory.dmp

          Filesize

          16KB

        • memory/1220-101-0x0000000000000000-mapping.dmp

        • memory/1496-78-0x00000000029A0000-0x00000000029E1000-memory.dmp

          Filesize

          260KB

        • memory/1496-72-0x00000000029A0000-0x00000000029BA000-memory.dmp

          Filesize

          104KB

        • memory/1496-76-0x00000000029B0000-0x00000000029CA000-memory.dmp

          Filesize

          104KB

        • memory/1496-74-0x00000000029B0000-0x00000000029CA000-memory.dmp

          Filesize

          104KB

        • memory/1496-79-0x00000000029A0000-0x00000000029E1000-memory.dmp

          Filesize

          260KB

        • memory/1496-73-0x00000000029A0000-0x00000000029BA000-memory.dmp

          Filesize

          104KB

        • memory/1496-71-0x0000000000400000-0x00000000005C9000-memory.dmp

          Filesize

          1.8MB

        • memory/1496-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB

        • memory/1496-81-0x00000000029B0000-0x00000000029F1000-memory.dmp

          Filesize

          260KB

        • memory/1496-80-0x00000000029B0000-0x00000000029F1000-memory.dmp

          Filesize

          260KB

        • memory/1496-75-0x00000000029B0000-0x00000000029CA000-memory.dmp

          Filesize

          104KB