Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:12

General

  • Target

    5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6.exe

  • Size

    622KB

  • MD5

    8935e8c56a13bd974f94373f187fc00b

  • SHA1

    ba4e69370f6954f87489508170ccf688aa323550

  • SHA256

    5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6

  • SHA512

    ff26ab5aba08f7188c442b5703260e2f651b207746a25b53443b41c9064680bba362664ea884bdfcb4ea2555750d688c00d1ae2952ef39f1b6a6d4a125aa8f34

  • SSDEEP

    12288:AuiB6bin34Lj+4re24FPTa5f0Wn/gvp1wZ9sFnW9QOh/NNZcy:SB6cuerFMfT/T9sJW9V9Ky

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yuuftwryykrxbtku

Signatures

  • NirSoft MailPassView 7 IoCs

    Password recovery tool for various email clients

  • Nirsoft 13 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6.exe
    "C:\Users\Admin\AppData\Local\Temp\5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6.exe
      "C:\Users\Admin\AppData\Local\Temp\5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy /z "C:\Users\Admin\AppData\Local\Temp\5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6.exe"
        3⤵
        • Drops startup file
        PID:1944
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
        3⤵
          PID:956
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 2200
          3⤵
            PID:1712
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
            3⤵
            • Accesses Microsoft Outlook accounts
            PID:1572
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:276
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1868
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c copy /z "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Adobe.exe"
                5⤵
                • Drops startup file
                PID:996
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
                5⤵
                  PID:1324
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                  dw20.exe -x -s 2160
                  5⤵
                  • Loads dropped DLL
                  PID:1912
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
                  5⤵
                  • Accesses Microsoft Outlook accounts
                  PID:1860
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of AdjustPrivilegeToken
                PID:1588

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          8935e8c56a13bd974f94373f187fc00b

          SHA1

          ba4e69370f6954f87489508170ccf688aa323550

          SHA256

          5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6

          SHA512

          ff26ab5aba08f7188c442b5703260e2f651b207746a25b53443b41c9064680bba362664ea884bdfcb4ea2555750d688c00d1ae2952ef39f1b6a6d4a125aa8f34

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          8935e8c56a13bd974f94373f187fc00b

          SHA1

          ba4e69370f6954f87489508170ccf688aa323550

          SHA256

          5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6

          SHA512

          ff26ab5aba08f7188c442b5703260e2f651b207746a25b53443b41c9064680bba362664ea884bdfcb4ea2555750d688c00d1ae2952ef39f1b6a6d4a125aa8f34

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          8935e8c56a13bd974f94373f187fc00b

          SHA1

          ba4e69370f6954f87489508170ccf688aa323550

          SHA256

          5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6

          SHA512

          ff26ab5aba08f7188c442b5703260e2f651b207746a25b53443b41c9064680bba362664ea884bdfcb4ea2555750d688c00d1ae2952ef39f1b6a6d4a125aa8f34

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          8935e8c56a13bd974f94373f187fc00b

          SHA1

          ba4e69370f6954f87489508170ccf688aa323550

          SHA256

          5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6

          SHA512

          ff26ab5aba08f7188c442b5703260e2f651b207746a25b53443b41c9064680bba362664ea884bdfcb4ea2555750d688c00d1ae2952ef39f1b6a6d4a125aa8f34

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Adobe.exe

          Filesize

          622KB

          MD5

          8935e8c56a13bd974f94373f187fc00b

          SHA1

          ba4e69370f6954f87489508170ccf688aa323550

          SHA256

          5d65e415b3e985162f67ce079d1e55723818b05e3aacc6e85196dd1bed0576c6

          SHA512

          ff26ab5aba08f7188c442b5703260e2f651b207746a25b53443b41c9064680bba362664ea884bdfcb4ea2555750d688c00d1ae2952ef39f1b6a6d4a125aa8f34

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Dnscache.exe

          Filesize

          7KB

          MD5

          34560fe55cedf502185ee393c9a7cbad

          SHA1

          8f889c0dfd81cc45b7c1ed7e02c2ac218bdd1b88

          SHA256

          c10aa251ae8985e2a0d937ee3d4fc564899f2ff847fb6ddc051dccc8fed4c534

          SHA512

          45837ddb402d5c1ecca90068d439f9216b9efae08b49f887c5e2ee8754ff9acb14aea2aa7cd705d5f95ba1e8c4069dd87ff5dddcf6caee9b71d66dfbd060f382

        • memory/276-118-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/276-119-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/276-115-0x0000000000000000-mapping.dmp

        • memory/956-90-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/956-84-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/956-91-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/956-78-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/956-79-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/956-81-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/956-83-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/956-87-0x000000000040E758-mapping.dmp

        • memory/956-86-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/996-145-0x0000000000000000-mapping.dmp

        • memory/1316-121-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1316-111-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1316-77-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1316-70-0x0000000000000000-mapping.dmp

        • memory/1324-157-0x000000000040E758-mapping.dmp

        • memory/1324-161-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1572-104-0x0000000000411654-mapping.dmp

        • memory/1572-98-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-101-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-100-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-103-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-107-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-95-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-109-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-96-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1572-112-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1588-136-0x0000000000000000-mapping.dmp

        • memory/1588-180-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1588-146-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1632-55-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1632-56-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1632-120-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1632-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB

        • memory/1712-92-0x0000000000000000-mapping.dmp

        • memory/1860-179-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1860-175-0x0000000000411654-mapping.dmp

        • memory/1868-128-0x000000000047076E-mapping.dmp

        • memory/1868-147-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1868-181-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1868-143-0x0000000000080000-0x00000000000F6000-memory.dmp

          Filesize

          472KB

        • memory/1868-131-0x0000000000080000-0x00000000000F6000-memory.dmp

          Filesize

          472KB

        • memory/1868-137-0x0000000000080000-0x00000000000F6000-memory.dmp

          Filesize

          472KB

        • memory/1912-162-0x0000000000000000-mapping.dmp

        • memory/1944-76-0x0000000000000000-mapping.dmp

        • memory/1976-63-0x000000000047076E-mapping.dmp

        • memory/1976-67-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1976-60-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1976-58-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1976-57-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1976-61-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1976-74-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1976-75-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1976-62-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1976-110-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1976-108-0x0000000074F90000-0x000000007553B000-memory.dmp

          Filesize

          5.7MB

        • memory/1976-65-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB