Analysis
-
max time kernel
195s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe
Resource
win7-20221111-en
General
-
Target
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe
-
Size
251KB
-
MD5
07674572cf79953c21898b8014967e52
-
SHA1
fd6c764b9b4fbd2c1dec2f26a5386bc48e769346
-
SHA256
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90
-
SHA512
7c947f210c575d6b38a7fb5e5dd4ecee409c2df389fb285644175be1e713ca29d0a9dc321bcb37fa85ed26a7a08e9a12c3e9d9be45de7f42e1fae3c8015a8f0b
-
SSDEEP
3072:4ar2vYb/wk6D6EWOzYQjqRbC+h7jTBLjF5FemO9QbBLUcLTUEwhdI:4ayvYb/wk6TWOALhXTB0meQlUcLQEw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
OutDisable.exepid process 872 OutDisable.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 432 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exepid process 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cmd.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run cmd.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exedescription pid process target process PID 624 set thread context of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\693A73FD-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
OutDisable.exepid process 872 OutDisable.exe 872 OutDisable.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe Token: SeSecurityPrivilege 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe Token: SeManageVolumePrivilege 280 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 280 WinMail.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exeOutDisable.execmd.exeexplorer.exedescription pid process target process PID 624 wrote to memory of 872 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe OutDisable.exe PID 624 wrote to memory of 872 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe OutDisable.exe PID 624 wrote to memory of 872 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe OutDisable.exe PID 624 wrote to memory of 872 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe OutDisable.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 776 872 OutDisable.exe explorer.exe PID 872 wrote to memory of 624 872 OutDisable.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 872 wrote to memory of 624 872 OutDisable.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 872 wrote to memory of 624 872 OutDisable.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 872 wrote to memory of 624 872 OutDisable.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 872 wrote to memory of 624 872 OutDisable.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 872 wrote to memory of 624 872 OutDisable.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 624 wrote to memory of 432 624 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 432 wrote to memory of 1272 432 cmd.exe Explorer.EXE PID 432 wrote to memory of 1272 432 cmd.exe Explorer.EXE PID 432 wrote to memory of 1272 432 cmd.exe Explorer.EXE PID 776 wrote to memory of 1272 776 explorer.exe Explorer.EXE PID 776 wrote to memory of 1272 776 explorer.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe"C:\Users\Admin\AppData\Local\Temp\9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\OutDisable.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\OutDisable.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5433c680.bat"3⤵
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5d871564f840a5998cdc3da05ad01f17f
SHA15069a6bb1c1ee0e7844137eb7ea3f8c4c949ed82
SHA256dc8a519d6b910158318b4b120282b0329c56b152210b5f7c88a734050172507b
SHA512fa35b277e3a7da5cc28296923011e0795d4bbd9c962448720288db900364a22f11c28da7cdb7fc767b8d62a84e109e91bf6588ee71153f7f5609827fe31804ef
-
Filesize
251KB
MD507674572cf79953c21898b8014967e52
SHA1fd6c764b9b4fbd2c1dec2f26a5386bc48e769346
SHA2569fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90
SHA5127c947f210c575d6b38a7fb5e5dd4ecee409c2df389fb285644175be1e713ca29d0a9dc321bcb37fa85ed26a7a08e9a12c3e9d9be45de7f42e1fae3c8015a8f0b
-
Filesize
251KB
MD507674572cf79953c21898b8014967e52
SHA1fd6c764b9b4fbd2c1dec2f26a5386bc48e769346
SHA2569fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90
SHA5127c947f210c575d6b38a7fb5e5dd4ecee409c2df389fb285644175be1e713ca29d0a9dc321bcb37fa85ed26a7a08e9a12c3e9d9be45de7f42e1fae3c8015a8f0b
-
Filesize
251KB
MD507674572cf79953c21898b8014967e52
SHA1fd6c764b9b4fbd2c1dec2f26a5386bc48e769346
SHA2569fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90
SHA5127c947f210c575d6b38a7fb5e5dd4ecee409c2df389fb285644175be1e713ca29d0a9dc321bcb37fa85ed26a7a08e9a12c3e9d9be45de7f42e1fae3c8015a8f0b