Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:25
Static task
static1
Behavioral task
behavioral1
Sample
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe
Resource
win7-20221111-en
General
-
Target
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe
-
Size
1.4MB
-
MD5
e30c81f42a72512d32754e595e80e942
-
SHA1
fe665ba908128e59957ff756a6a7984a0f71b2c6
-
SHA256
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e
-
SHA512
d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff
-
SSDEEP
24576:j0AZbveE+KiB7+AwKeAm8J7X32A66MisH+98OqoYaejLs13doYg7:vbveE+tyAwBAm8RXale980sjLMA7
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
general123
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dwm\\dwm.exe" 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe -
NirSoft WebBrowserPassView 9 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/660-63-0x0000000000400000-0x000000000046C000-memory.dmp WebBrowserPassView behavioral1/memory/660-64-0x0000000000400000-0x000000000046C000-memory.dmp WebBrowserPassView behavioral1/memory/660-71-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral1/memory/660-73-0x0000000000400000-0x000000000046C000-memory.dmp WebBrowserPassView behavioral1/memory/660-76-0x0000000000400000-0x000000000046C000-memory.dmp WebBrowserPassView behavioral1/memory/992-87-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/992-88-0x0000000000442628-mapping.dmp WebBrowserPassView behavioral1/memory/992-89-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/992-90-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 9 IoCs
Processes:
resource yara_rule behavioral1/memory/660-63-0x0000000000400000-0x000000000046C000-memory.dmp Nirsoft behavioral1/memory/660-64-0x0000000000400000-0x000000000046C000-memory.dmp Nirsoft behavioral1/memory/660-71-0x0000000000000000-mapping.dmp Nirsoft behavioral1/memory/660-73-0x0000000000400000-0x000000000046C000-memory.dmp Nirsoft behavioral1/memory/660-76-0x0000000000400000-0x000000000046C000-memory.dmp Nirsoft behavioral1/memory/992-87-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/992-88-0x0000000000442628-mapping.dmp Nirsoft behavioral1/memory/992-89-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/992-90-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
Processes:
notepad .exepid process 660 notepad .exe -
Loads dropped DLL 1 IoCs
Processes:
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exepid process 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 whatismyipaddress.com 6 whatismyipaddress.com 7 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exenotepad .exedescription pid process target process PID 1772 set thread context of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 660 set thread context of 992 660 notepad .exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 456 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exenotepad .exepid process 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe 660 notepad .exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exenotepad .exedescription pid process Token: SeDebugPrivilege 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe Token: SeDebugPrivilege 660 notepad .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
notepad .exepid process 660 notepad .exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.execmd.exewscript.execmd.exenotepad .exedescription pid process target process PID 1772 wrote to memory of 1712 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1712 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1712 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1712 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1772 wrote to memory of 660 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe notepad .exe PID 1712 wrote to memory of 884 1712 cmd.exe wscript.exe PID 1712 wrote to memory of 884 1712 cmd.exe wscript.exe PID 1712 wrote to memory of 884 1712 cmd.exe wscript.exe PID 1712 wrote to memory of 884 1712 cmd.exe wscript.exe PID 884 wrote to memory of 1100 884 wscript.exe cmd.exe PID 884 wrote to memory of 1100 884 wscript.exe cmd.exe PID 884 wrote to memory of 1100 884 wscript.exe cmd.exe PID 884 wrote to memory of 1100 884 wscript.exe cmd.exe PID 1772 wrote to memory of 1748 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1748 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1748 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1748 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1748 wrote to memory of 456 1748 cmd.exe timeout.exe PID 1748 wrote to memory of 456 1748 cmd.exe timeout.exe PID 1748 wrote to memory of 456 1748 cmd.exe timeout.exe PID 1748 wrote to memory of 456 1748 cmd.exe timeout.exe PID 1772 wrote to memory of 1916 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1916 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1916 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 1772 wrote to memory of 1916 1772 3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe cmd.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe PID 660 wrote to memory of 992 660 notepad .exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe"C:\Users\Admin\AppData\Local\Temp\3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dwm\mata.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\dwm\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat3⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat" "4⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\notepad .exe"C:\Users\Admin\AppData\Local\Temp\notepad .exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵PID:992
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dwm\stres.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- Delays execution with timeout.exe
PID:456 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dwm\melt.bat2⤵PID:1916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5e30c81f42a72512d32754e595e80e942
SHA1fe665ba908128e59957ff756a6a7984a0f71b2c6
SHA2563f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e
SHA512d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
55B
MD53869b1297bc06c40dc6f5ea31718bff0
SHA1e5653782e1b9744e96986f39193efcc6387738db
SHA256f93541eaa86aee5f93d653aba074dc54036930dce6bc451aa34a8e70040c9b12
SHA5123ba9e57331a04511edc2539827e056f4ad9dde0290638d5e628d1b29e2d367bfc17b1143b1f2cb5f07ebafac68464efdf562d98e29bf2f5622f3773fc0ec5b45
-
Filesize
56B
MD5be1178e094e74d093f967770b1a7964c
SHA172be3cc73763b4cf3363aad44893a87090601c1f
SHA256c54a8f69995f08d626a728a4df16011e509f314f6ab9ffaa951def8493198d46
SHA51202af9f756ed552f6f0b14b4ea1482ef4b8479d53c42e35e905b1c67bd0362766d6484613880dbca45c20cb5730f5bdf6ba5d2141e830d1cf971388860492a9e2
-
Filesize
1.4MB
MD5e30c81f42a72512d32754e595e80e942
SHA1fe665ba908128e59957ff756a6a7984a0f71b2c6
SHA2563f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e
SHA512d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff
-
Filesize
203B
MD5b925c3b33f6d0202920661322f1ec35f
SHA11ead16fd004506d5ca48d9fcf39153b59baa50ec
SHA256e5b85a2f172ba9f4f91eb938abb8d53bbf3a354cc84cee404717788d95542f91
SHA512152c5f2a8753d0f369bd268d4c2244abde92bcc7fad0607a0c99aaeacfa91e13e6a6c7aec2ab9a5a34864517df2bbcb2a0d59a6949cd35f1441d3701df9e283b
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9