Analysis
-
max time kernel
80s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:32
Static task
static1
Behavioral task
behavioral1
Sample
f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe
Resource
win10v2004-20221111-en
General
-
Target
f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe
-
Size
380KB
-
MD5
0b0e74f1302114ddfb876db4226ddad9
-
SHA1
8b43877291c8ff9ad848efabfdced7860cf98bf0
-
SHA256
f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da
-
SHA512
b0d9898c8f6d4fdee33ac8d72aa32cfd5b525727d79154ca849aa550d6bb5617abf04f8d5466a2cd18aa0f2184bd5282dacab16edfdf8c92883c6478f9521386
-
SSDEEP
6144:zXuC3K3FeMFKaMj0PaWufEO9gTgz6QAS/PYCUM83ZON7LGMpE2VsqTUs7:zuSK3lAajufm66cPs+FLGMpyhs
Malware Config
Signatures
-
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/900-70-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/900-72-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/900-74-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/900-76-0x000000000047EA4E-mapping.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/900-70-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/900-72-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/900-74-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/900-76-0x000000000047EA4E-mapping.dmp WebBrowserPassView -
Nirsoft 4 IoCs
Processes:
resource yara_rule behavioral1/memory/900-70-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/900-72-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/900-74-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/900-76-0x000000000047EA4E-mapping.dmp Nirsoft -
Executes dropped EXE 3 IoCs
Processes:
defender.exedefender.exedefender.exepid process 1396 defender.exe 1472 defender.exe 900 defender.exe -
Loads dropped DLL 2 IoCs
Processes:
f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exepid process 1352 f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe 1352 f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
defender.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\defender.exe" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\defender.exe" defender.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
defender.exedescription pid process target process PID 1396 set thread context of 900 1396 defender.exe defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exedefender.exedescription pid process target process PID 1352 wrote to memory of 1396 1352 f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe defender.exe PID 1352 wrote to memory of 1396 1352 f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe defender.exe PID 1352 wrote to memory of 1396 1352 f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe defender.exe PID 1352 wrote to memory of 1396 1352 f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe defender.exe PID 1396 wrote to memory of 1472 1396 defender.exe defender.exe PID 1396 wrote to memory of 1472 1396 defender.exe defender.exe PID 1396 wrote to memory of 1472 1396 defender.exe defender.exe PID 1396 wrote to memory of 1472 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe PID 1396 wrote to memory of 900 1396 defender.exe defender.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe"C:\Users\Admin\AppData\Local\Temp\f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\defender.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\defender.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\defender.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\defender.exe"3⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\defender.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\defender.exe"3⤵
- Executes dropped EXE
PID:900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD50b0e74f1302114ddfb876db4226ddad9
SHA18b43877291c8ff9ad848efabfdced7860cf98bf0
SHA256f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da
SHA512b0d9898c8f6d4fdee33ac8d72aa32cfd5b525727d79154ca849aa550d6bb5617abf04f8d5466a2cd18aa0f2184bd5282dacab16edfdf8c92883c6478f9521386
-
Filesize
380KB
MD50b0e74f1302114ddfb876db4226ddad9
SHA18b43877291c8ff9ad848efabfdced7860cf98bf0
SHA256f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da
SHA512b0d9898c8f6d4fdee33ac8d72aa32cfd5b525727d79154ca849aa550d6bb5617abf04f8d5466a2cd18aa0f2184bd5282dacab16edfdf8c92883c6478f9521386
-
Filesize
380KB
MD50b0e74f1302114ddfb876db4226ddad9
SHA18b43877291c8ff9ad848efabfdced7860cf98bf0
SHA256f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da
SHA512b0d9898c8f6d4fdee33ac8d72aa32cfd5b525727d79154ca849aa550d6bb5617abf04f8d5466a2cd18aa0f2184bd5282dacab16edfdf8c92883c6478f9521386
-
Filesize
380KB
MD50b0e74f1302114ddfb876db4226ddad9
SHA18b43877291c8ff9ad848efabfdced7860cf98bf0
SHA256f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da
SHA512b0d9898c8f6d4fdee33ac8d72aa32cfd5b525727d79154ca849aa550d6bb5617abf04f8d5466a2cd18aa0f2184bd5282dacab16edfdf8c92883c6478f9521386
-
Filesize
380KB
MD50b0e74f1302114ddfb876db4226ddad9
SHA18b43877291c8ff9ad848efabfdced7860cf98bf0
SHA256f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da
SHA512b0d9898c8f6d4fdee33ac8d72aa32cfd5b525727d79154ca849aa550d6bb5617abf04f8d5466a2cd18aa0f2184bd5282dacab16edfdf8c92883c6478f9521386
-
Filesize
380KB
MD50b0e74f1302114ddfb876db4226ddad9
SHA18b43877291c8ff9ad848efabfdced7860cf98bf0
SHA256f0fcd122b6c9956f3a5a0a2636710f53d2127f400cdcbcfe61d877a8ecee50da
SHA512b0d9898c8f6d4fdee33ac8d72aa32cfd5b525727d79154ca849aa550d6bb5617abf04f8d5466a2cd18aa0f2184bd5282dacab16edfdf8c92883c6478f9521386