Analysis

  • max time kernel
    187s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:51

General

  • Target

    1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f.exe

  • Size

    622KB

  • MD5

    49bf94707e8c8f9bd40e617165be5b52

  • SHA1

    f4f5b6cd9c87acd6619ee76e4c0ac388583ff7c5

  • SHA256

    1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f

  • SHA512

    a0090c396c230f7c51b53e4b947556f26e887e1ea186e0c076ab840fc633db4697c947d8950a2aa3ec54717b88b12ade4f43538cd2fed9144d431c7e65a2221b

  • SSDEEP

    12288:A8w7gYZ4+Rutkdy2oqvdT406LGrkGE4Qiujc+zNNZcy:tw7pXktkHT40BFE77FzKy

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    glfjdvzcsbfwvmtr

Signatures

  • NirSoft MailPassView 8 IoCs

    Password recovery tool for various email clients

  • Nirsoft 15 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f.exe
    "C:\Users\Admin\AppData\Local\Temp\1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f.exe
      "C:\Users\Admin\AppData\Local\Temp\1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
        3⤵
          PID:1052
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1944
          3⤵
            PID:1436
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
            3⤵
            • Accesses Microsoft Outlook accounts
            PID:1924
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1484
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1204
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:536
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
                5⤵
                  PID:880
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                  dw20.exe -x -s 1268
                  5⤵
                  • Loads dropped DLL
                  PID:1944
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
                  5⤵
                  • Accesses Microsoft Outlook accounts
                  PID:1868
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of AdjustPrivilegeToken
                PID:1872

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          49bf94707e8c8f9bd40e617165be5b52

          SHA1

          f4f5b6cd9c87acd6619ee76e4c0ac388583ff7c5

          SHA256

          1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f

          SHA512

          a0090c396c230f7c51b53e4b947556f26e887e1ea186e0c076ab840fc633db4697c947d8950a2aa3ec54717b88b12ade4f43538cd2fed9144d431c7e65a2221b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          49bf94707e8c8f9bd40e617165be5b52

          SHA1

          f4f5b6cd9c87acd6619ee76e4c0ac388583ff7c5

          SHA256

          1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f

          SHA512

          a0090c396c230f7c51b53e4b947556f26e887e1ea186e0c076ab840fc633db4697c947d8950a2aa3ec54717b88b12ade4f43538cd2fed9144d431c7e65a2221b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          49bf94707e8c8f9bd40e617165be5b52

          SHA1

          f4f5b6cd9c87acd6619ee76e4c0ac388583ff7c5

          SHA256

          1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f

          SHA512

          a0090c396c230f7c51b53e4b947556f26e887e1ea186e0c076ab840fc633db4697c947d8950a2aa3ec54717b88b12ade4f43538cd2fed9144d431c7e65a2221b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          49bf94707e8c8f9bd40e617165be5b52

          SHA1

          f4f5b6cd9c87acd6619ee76e4c0ac388583ff7c5

          SHA256

          1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f

          SHA512

          a0090c396c230f7c51b53e4b947556f26e887e1ea186e0c076ab840fc633db4697c947d8950a2aa3ec54717b88b12ade4f43538cd2fed9144d431c7e65a2221b

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          49bf94707e8c8f9bd40e617165be5b52

          SHA1

          f4f5b6cd9c87acd6619ee76e4c0ac388583ff7c5

          SHA256

          1bb23fb612b0e226c7c5ef11bba8967cf997fd11d33cffcd68ffdba2733efa0f

          SHA512

          a0090c396c230f7c51b53e4b947556f26e887e1ea186e0c076ab840fc633db4697c947d8950a2aa3ec54717b88b12ade4f43538cd2fed9144d431c7e65a2221b

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • memory/536-125-0x00000000004707EE-mapping.dmp

        • memory/536-171-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/536-172-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/536-133-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/536-132-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/880-152-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/880-149-0x000000000040E758-mapping.dmp

        • memory/880-153-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-83-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-78-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-84-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-86-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-87-0x000000000040E758-mapping.dmp

        • memory/1052-90-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-91-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-81-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1052-79-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1172-56-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1172-55-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1172-117-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1172-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

          Filesize

          8KB

        • memory/1204-98-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1204-94-0x0000000000000000-mapping.dmp

        • memory/1204-115-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1436-97-0x0000000000000000-mapping.dmp

        • memory/1460-60-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1460-61-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1460-63-0x00000000004707EE-mapping.dmp

        • memory/1460-62-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1460-65-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1460-67-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1460-58-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1460-72-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1460-57-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1460-76-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1484-75-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1484-77-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1484-118-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1484-70-0x0000000000000000-mapping.dmp

        • memory/1868-175-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1868-173-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1868-167-0x0000000000411654-mapping.dmp

        • memory/1872-174-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1872-135-0x0000000000000000-mapping.dmp

        • memory/1872-139-0x0000000074CB0000-0x000000007525B000-memory.dmp

          Filesize

          5.7MB

        • memory/1924-109-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-110-0x0000000000411654-mapping.dmp

        • memory/1924-107-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-106-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-113-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-104-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-102-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-114-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-116-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1924-101-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1944-154-0x0000000000000000-mapping.dmp