Analysis
-
max time kernel
308s -
max time network
331s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe
Resource
win10-20220901-en
General
-
Target
c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe
-
Size
2.9MB
-
MD5
a5f6fe293b8bf48e9dcdbcfb706e82ec
-
SHA1
fed1b5dc772776a7ce9c973783f8f28312ae4568
-
SHA256
c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45
-
SHA512
a1bf36d02872193974ced1c0d46ac58eecade0ea9d4b4f8e75906f94f00b7f3060db113b018214c8f6282011acef8f954614712f700a62b2dd62b85ba9387ec0
-
SSDEEP
49152:vnTlyRcDAG06K7UgbTCsj8uKYRQQf73eSLiGfyJuvDgT4yr:7lWcDAP7LbhjrH+fuvD1yr
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 4 360 rundll32.exe 5 360 rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 360 rundll32.exe 360 rundll32.exe 360 rundll32.exe 360 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
InstallUtil.exepid process 2016 InstallUtil.exe 2016 InstallUtil.exe 2016 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exedescription pid process target process PID 956 set thread context of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exerundll32.exepid process 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe 360 rundll32.exe 360 rundll32.exe 360 rundll32.exe 360 rundll32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exeInstallUtil.exedescription pid process target process PID 956 wrote to memory of 2020 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2020 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2020 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2020 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2020 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2020 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2020 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 956 wrote to memory of 2016 956 c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe InstallUtil.exe PID 2016 wrote to memory of 360 2016 InstallUtil.exe rundll32.exe PID 2016 wrote to memory of 360 2016 InstallUtil.exe rundll32.exe PID 2016 wrote to memory of 360 2016 InstallUtil.exe rundll32.exe PID 2016 wrote to memory of 360 2016 InstallUtil.exe rundll32.exe -
outlook_office_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe"C:\Users\Admin\AppData\Local\Temp\c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2020
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\rundll32.exe"C:\Users\Admin\AppData\Roaming\nsis_uns6d60a7.dll",PrintUIEntry |5CQkOhiAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAOVkHwBs8|AtBUYAae43ADYAUh8AcQBm|h8AaQBrAFEATvsATS0CWUiD7Cj|6AQCAABIg8T|KMPMzMxMiUT|JBhIiVQkEEjviUwkCFkBSItEvyQwSIkEJH0BOP1IawAISMdEJBD2LQHrDn0BEEiDwHUBiwEQfQFASDmSAPtzJZsDiwwkSAN|yEiLwUiLTKcB|VR3AAPRSIvKit8JiAjrwWIFZUjviwQlYPPwM8lI|4tQGEg70XQ2|0iDwiBIiwJI|zvCdCpmg3hI|xh1GkyLQFBmv0GDOGt0Bw0RS|t1CA0QeBAudAX|SIsA69VIi0j6+QDBZgBAU1VWV|9BVEFVQVZBV|5ZAWaBOU1aTYv|+EyL8kiL2Q|7hfzz8ExjSTxB|4E8CVBFAAAP+4Xq8|BBi4QJiP7z8IXASI08AQ97hNZmEYO8CYwtAfcPhMfz8ESLZyD|RItfHIt3JET|i08YTAPhTAP|2UgD8TPJRYXvyQ+EpPPwTYvE|0GLEEUz0kgD|9OKAoTAdB1Bv8HKDQ++wPYAAfdEA9C7EXXsQYH|+qr8DXx0DoP|wQFJg8AEQTv|yXNp68aLwQ||twxORYssi0y|A+t0WDPtphB071FBixS9ANMzyf+KAkyLwusPwe3JxBEDyOEQAUGK|QDREO0zwDP2Qec7DLbcEKIAg8YB|4P4CHLu6wpI|4vLQf|VSYkE9|eDxeAQxAQ7b|cYcq9iAUFfQV7|QV1BXF9eXVu+LxdIgexgAWAAi||p6Gb+||9IhW|AD4SZcSBMjasBfYsnEMgz|+ibeSD|jV8ETI1FQjN|0ovL|1QkaHwgv0yL4A+EbHEgRd6kEDPAi9ONIEiJ13wkIKIgcHwgSIvP8A+ETHEgoiBQSP+NVghEjUdASPeNjCSBEUiL2Oi7fP16II1WSNogENreIczz8Ohn6yBEi08GjVcIPSCiIFjGIa+JhCSAgxLd8|CLPQ7WIFiJjCRtEQMw9o0g6DHrIEyLXTq7i6wpMkiLnBYyTP+JZCQ4RI1nbO9JO+xIhiAwTIndXIABhCTcgxGGjvTjId8g8KwTSIvT6Nvn|AEwipxzMkiN|YRzMkGA8yFJi+|MRDAYoAKD6QHvdfOBvHMyIVJlf3h1SouEJPQeMfeUJPjz8APCSDv|6HI1QTvUdjD|RI1JQEkr1EHTuACUAKIgQMYi+HTzF0S0ML4xSI1TbL6NIE0rxOhsgDBI+4vOoiB4SIX|dPMUTIwwFzFIjUwk90C6A|Pw|9dIgRnEcCFdJAAA3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5664e46926466a2d4c9b87540f4853c39
SHA1b172d1c2bde331770b0a944fcf6a9e2d75ded66b
SHA25692a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488
SHA5121490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03
-
Filesize
58KB
MD5664e46926466a2d4c9b87540f4853c39
SHA1b172d1c2bde331770b0a944fcf6a9e2d75ded66b
SHA25692a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488
SHA5121490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03
-
Filesize
58KB
MD5664e46926466a2d4c9b87540f4853c39
SHA1b172d1c2bde331770b0a944fcf6a9e2d75ded66b
SHA25692a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488
SHA5121490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03
-
Filesize
58KB
MD5664e46926466a2d4c9b87540f4853c39
SHA1b172d1c2bde331770b0a944fcf6a9e2d75ded66b
SHA25692a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488
SHA5121490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03
-
Filesize
58KB
MD5664e46926466a2d4c9b87540f4853c39
SHA1b172d1c2bde331770b0a944fcf6a9e2d75ded66b
SHA25692a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488
SHA5121490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03