Analysis

  • max time kernel
    151s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 22:44

General

  • Target

    88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9.exe

  • Size

    595KB

  • MD5

    22fa3f044edf21da1808efd9138727d2

  • SHA1

    f66f70f4763a9d0dd2ebd0803d2f46d691a338fb

  • SHA256

    88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9

  • SHA512

    19f904d86aac592b1edca4b257c292ed78de219c5007564eb74e587a8d1f0c1de7f2f3a47629445cddb6375cfd2c4e90bea019baadb4b5bb87279b2d52f89f78

  • SSDEEP

    12288:QtmXjD9Ye5veJVJPbCjXr2CIjfcXL88WOouNyg1kXGLb:QtmX2bJj+j72ffEPWOPwub

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ejcmrquuosqeqgpx

Signatures

  • NirSoft MailPassView 9 IoCs

    Password recovery tool for various email clients

  • Nirsoft 16 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9.exe
    "C:\Users\Admin\AppData\Local\Temp\88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9.exe
      "C:\Users\Admin\AppData\Local\Temp\88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy /z "C:\Users\Admin\AppData\Local\Temp\88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9.exe"
        3⤵
        • Drops startup file
        PID:1548
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
        3⤵
          PID:1860
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1396
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 2296
          3⤵
            PID:1704
        • C:\Users\Admin\AppData\Roaming\Microsoft\IpOverUsbSvrc.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\IpOverUsbSvrc.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1020
          • C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:616
            • C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1896
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c copy /z "C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiesrx.exe"
                5⤵
                • Drops startup file
                PID:788
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
                5⤵
                  PID:2036
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                  dw20.exe -x -s 2192
                  5⤵
                  • Loads dropped DLL
                  PID:928
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
                  5⤵
                  • Accesses Microsoft Outlook accounts
                  PID:1980

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\logff.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Microsoft\IpOverUsbSvrc.exe

          Filesize

          8KB

          MD5

          54fbde415453f5c9089b49e65bd5f8e7

          SHA1

          d77b86631f629b52bbebc6e08fbf60c78e8ceab0

          SHA256

          7d31b70e949833d9f78199848b14307e41da511ca4915c20a8ca61ee8eeeedbf

          SHA512

          90dbbb3986ab3f4dda4292b580bfac7c97bbf20f68d0be0af271b9bc5e22a4abc326baaf284be005c6460ecc2187b6ca5d015fab55be3b242122436fcf3ee5ed

        • C:\Users\Admin\AppData\Roaming\Microsoft\IpOverUsbSvrc.exe

          Filesize

          8KB

          MD5

          54fbde415453f5c9089b49e65bd5f8e7

          SHA1

          d77b86631f629b52bbebc6e08fbf60c78e8ceab0

          SHA256

          7d31b70e949833d9f78199848b14307e41da511ca4915c20a8ca61ee8eeeedbf

          SHA512

          90dbbb3986ab3f4dda4292b580bfac7c97bbf20f68d0be0af271b9bc5e22a4abc326baaf284be005c6460ecc2187b6ca5d015fab55be3b242122436fcf3ee5ed

        • C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe

          Filesize

          595KB

          MD5

          22fa3f044edf21da1808efd9138727d2

          SHA1

          f66f70f4763a9d0dd2ebd0803d2f46d691a338fb

          SHA256

          88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9

          SHA512

          19f904d86aac592b1edca4b257c292ed78de219c5007564eb74e587a8d1f0c1de7f2f3a47629445cddb6375cfd2c4e90bea019baadb4b5bb87279b2d52f89f78

        • C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe

          Filesize

          595KB

          MD5

          22fa3f044edf21da1808efd9138727d2

          SHA1

          f66f70f4763a9d0dd2ebd0803d2f46d691a338fb

          SHA256

          88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9

          SHA512

          19f904d86aac592b1edca4b257c292ed78de219c5007564eb74e587a8d1f0c1de7f2f3a47629445cddb6375cfd2c4e90bea019baadb4b5bb87279b2d52f89f78

        • C:\Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe

          Filesize

          595KB

          MD5

          22fa3f044edf21da1808efd9138727d2

          SHA1

          f66f70f4763a9d0dd2ebd0803d2f46d691a338fb

          SHA256

          88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9

          SHA512

          19f904d86aac592b1edca4b257c292ed78de219c5007564eb74e587a8d1f0c1de7f2f3a47629445cddb6375cfd2c4e90bea019baadb4b5bb87279b2d52f89f78

        • \Users\Admin\AppData\Roaming\Microsoft\IpOverUsbSvrc.exe

          Filesize

          8KB

          MD5

          54fbde415453f5c9089b49e65bd5f8e7

          SHA1

          d77b86631f629b52bbebc6e08fbf60c78e8ceab0

          SHA256

          7d31b70e949833d9f78199848b14307e41da511ca4915c20a8ca61ee8eeeedbf

          SHA512

          90dbbb3986ab3f4dda4292b580bfac7c97bbf20f68d0be0af271b9bc5e22a4abc326baaf284be005c6460ecc2187b6ca5d015fab55be3b242122436fcf3ee5ed

        • \Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe

          Filesize

          595KB

          MD5

          22fa3f044edf21da1808efd9138727d2

          SHA1

          f66f70f4763a9d0dd2ebd0803d2f46d691a338fb

          SHA256

          88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9

          SHA512

          19f904d86aac592b1edca4b257c292ed78de219c5007564eb74e587a8d1f0c1de7f2f3a47629445cddb6375cfd2c4e90bea019baadb4b5bb87279b2d52f89f78

        • \Users\Admin\AppData\Roaming\Microsoft\atiesrx.exe

          Filesize

          595KB

          MD5

          22fa3f044edf21da1808efd9138727d2

          SHA1

          f66f70f4763a9d0dd2ebd0803d2f46d691a338fb

          SHA256

          88595e929142868e16cd37da00c66a221a908592cac677e8adf325d2bc1207f9

          SHA512

          19f904d86aac592b1edca4b257c292ed78de219c5007564eb74e587a8d1f0c1de7f2f3a47629445cddb6375cfd2c4e90bea019baadb4b5bb87279b2d52f89f78

        • memory/468-62-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/468-79-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/468-67-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/468-63-0x00000000004705AE-mapping.dmp

        • memory/468-65-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/468-98-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/468-57-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/468-61-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/468-60-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/468-58-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/616-82-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/616-76-0x0000000000000000-mapping.dmp

        • memory/616-100-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/788-138-0x0000000000000000-mapping.dmp

        • memory/928-153-0x0000000000000000-mapping.dmp

        • memory/1020-80-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/1020-70-0x0000000000000000-mapping.dmp

        • memory/1020-99-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/1244-117-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/1244-54-0x0000000076531000-0x0000000076533000-memory.dmp

          Filesize

          8KB

        • memory/1244-55-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/1244-56-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/1396-103-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-108-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-173-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-170-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-112-0x0000000000411654-mapping.dmp

        • memory/1396-102-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-105-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-116-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-109-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-115-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1396-111-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1548-81-0x0000000000000000-mapping.dmp

        • memory/1704-106-0x0000000000000000-mapping.dmp

        • memory/1860-83-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-88-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-89-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-91-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-84-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-95-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-96-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-86-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1860-92-0x000000000040E758-mapping.dmp

        • memory/1860-97-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1896-128-0x0000000000080000-0x00000000000F6000-memory.dmp

          Filesize

          472KB

        • memory/1896-137-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/1896-135-0x0000000000080000-0x00000000000F6000-memory.dmp

          Filesize

          472KB

        • memory/1896-132-0x0000000000080000-0x00000000000F6000-memory.dmp

          Filesize

          472KB

        • memory/1896-125-0x00000000004705AE-mapping.dmp

        • memory/1896-172-0x0000000074BA0000-0x000000007514B000-memory.dmp

          Filesize

          5.7MB

        • memory/1980-166-0x0000000000411654-mapping.dmp

        • memory/1980-171-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1980-174-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2036-152-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2036-148-0x000000000040E758-mapping.dmp