Analysis
-
max time kernel
246s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 06:09
Static task
static1
Behavioral task
behavioral1
Sample
fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe
Resource
win10v2004-20221111-en
General
-
Target
fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe
-
Size
747KB
-
MD5
c0f8d6e6de7e66c2fac32b5a8909574d
-
SHA1
6b04d553eb612a53e3a56b0785db8bd1031e0efe
-
SHA256
fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2
-
SHA512
d8eaea3476682f394c41b8a0a4c25eb73c71e8346b40d6c9f4698abce4bb4d133197fa824c27c31b22663b5b568dd61fdd190cc56055a5988cf66f4bdcfe900f
-
SSDEEP
12288:V/nLsOy/13K4rAPJYLGMLTYEG/jiLkMfe3d1Y1YExsL7a1Zhn1p:VfLBIK4raJx4O1OYExsL7eZl
Malware Config
Signatures
-
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/4788-135-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/4788-135-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView -
Nirsoft 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4788-135-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exedescription pid process target process PID 4012 set thread context of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exedescription pid process target process PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe PID 4012 wrote to memory of 4788 4012 fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe"C:\Users\Admin\AppData\Local\Temp\fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exeC:\Users\Admin\AppData\Local\Temp\fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\fa21bc66b1024ede6ec86ab054350cd738dea8ad68c63bef8eeadf27661a97a2.exe.logFilesize
594B
MD5fdb26b3b547022b45cfaeee57eafd566
SHA111c6798b8a59233f404014c5e79b3363cd564b37
SHA2562707fc7f074413881b7bafca05079327b188db6005709951e7f69d39a2af97c0
SHA51244d9bb8c0f0b341690d00eda86e15a50f7f29ce9595925c1a2a7e19ad26202d10049a7a97bea278ecb7d429ad555de8edceeffff664d4b06309a9410a09bb700
-
memory/4012-132-0x00000000746E0000-0x0000000074C91000-memory.dmpFilesize
5.7MB
-
memory/4012-133-0x00000000746E0000-0x0000000074C91000-memory.dmpFilesize
5.7MB
-
memory/4012-137-0x00000000746E0000-0x0000000074C91000-memory.dmpFilesize
5.7MB
-
memory/4788-134-0x0000000000000000-mapping.dmp
-
memory/4788-135-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/4788-138-0x00000000746E0000-0x0000000074C91000-memory.dmpFilesize
5.7MB