Analysis
-
max time kernel
158s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 15:21
Static task
static1
Behavioral task
behavioral1
Sample
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
Resource
win7-20220812-en
General
-
Target
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
-
Size
1.1MB
-
MD5
ba3cc56d2789e98e6ec31a5d3a455dc9
-
SHA1
598a791b139482c0dfe5b82efce49ab33e45937e
-
SHA256
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4
-
SHA512
f4cd0461956a3dce719f5f683a214ab1ef9c88537073810b3afa9ad21c9df7cb61df44869c486ac53c5c9a61ad30764737b4e30a7fcc5f97e208572b6b6f93e4
-
SSDEEP
24576:/L/VPEY9IouAH3TDnIODApL76fjpDxuGhQHJEocBRBkPU7:DVPEKIQDDnIOs576pDxuG+pE5XWw
Malware Config
Signatures
-
NirSoft MailPassView 7 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tmp.exe MailPassView C:\Users\Admin\AppData\Local\Temp\tmp.exe MailPassView behavioral2/memory/4676-138-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral2/memory/2592-145-0x0000000000000000-mapping.dmp MailPassView behavioral2/memory/2592-146-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/2592-148-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/2592-149-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 8 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tmp.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\tmp.exe WebBrowserPassView behavioral2/memory/4676-138-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral2/memory/4832-150-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/4832-151-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4832-153-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4832-154-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4832-156-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 12 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tmp.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\tmp.exe Nirsoft behavioral2/memory/4676-138-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral2/memory/2592-145-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/2592-146-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/2592-148-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/2592-149-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4832-150-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/4832-151-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4832-153-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4832-154-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4832-156-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
Processes:
tmp.exepid process 3648 tmp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 63 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exetmp.exedescription pid process target process PID 1392 set thread context of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 3648 set thread context of 2592 3648 tmp.exe vbc.exe PID 3648 set thread context of 4832 3648 tmp.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exevbc.exetmp.exepid process 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 4832 vbc.exe 4832 vbc.exe 3648 tmp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exetmp.exedescription pid process Token: SeDebugPrivilege 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe Token: 33 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe Token: SeIncBasePriorityPrivilege 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe Token: SeDebugPrivilege 3648 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
tmp.exepid process 3648 tmp.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exetmp.exedescription pid process target process PID 1392 wrote to memory of 3648 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe tmp.exe PID 1392 wrote to memory of 3648 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe tmp.exe PID 1392 wrote to memory of 3648 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe tmp.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 1392 wrote to memory of 4676 1392 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe 2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 2592 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe PID 3648 wrote to memory of 4832 3648 tmp.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe"C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exeC:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe.logFilesize
408B
MD540b0c3caa1b14a4c83e8475c46bf2016
SHA1af9575cda4d842f028d18b17063796a894ecd9d0
SHA25670e88a428d92b6ab5905dac9f324824c4c6f120bc3f385c82b2d12f707a4a867
SHA512916437df737de4b6063b7116b4d148229d4a975eb4046122d47434b81fba06e88e09e5f273ec496c81ef3feecb843ccad20a7a04074224416c1fa9951acbdac7
-
C:\Users\Admin\AppData\Local\Temp\holderwb.txtFilesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
521KB
MD51d1d46f74986d9bb59d9c1168b61f352
SHA18a3c0da1a653fd6d6b96606ec5a9cf53be3e9465
SHA2566e9e3275d56c24e7e13dfe749dd0c8999ffba6f2aba184f108b226175c798514
SHA5122c70656c99b72d7bfb15fa58523b3825f416b5525c8e5f293be41fb3de6fa708cb68c79575ec8015d6259df99eb4645368f403ed23df1c2f7db93b3ad73ad9cd
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
521KB
MD51d1d46f74986d9bb59d9c1168b61f352
SHA18a3c0da1a653fd6d6b96606ec5a9cf53be3e9465
SHA2566e9e3275d56c24e7e13dfe749dd0c8999ffba6f2aba184f108b226175c798514
SHA5122c70656c99b72d7bfb15fa58523b3825f416b5525c8e5f293be41fb3de6fa708cb68c79575ec8015d6259df99eb4645368f403ed23df1c2f7db93b3ad73ad9cd
-
memory/1392-140-0x00000000751A0000-0x0000000075751000-memory.dmpFilesize
5.7MB
-
memory/1392-133-0x00000000751A0000-0x0000000075751000-memory.dmpFilesize
5.7MB
-
memory/1392-132-0x00000000751A0000-0x0000000075751000-memory.dmpFilesize
5.7MB
-
memory/2592-148-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2592-146-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2592-149-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2592-145-0x0000000000000000-mapping.dmp
-
memory/3648-134-0x0000000000000000-mapping.dmp
-
memory/3648-139-0x00000000751A0000-0x0000000075751000-memory.dmpFilesize
5.7MB
-
memory/3648-144-0x00000000751A0000-0x0000000075751000-memory.dmpFilesize
5.7MB
-
memory/4676-143-0x00000000751A0000-0x0000000075751000-memory.dmpFilesize
5.7MB
-
memory/4676-137-0x0000000000000000-mapping.dmp
-
memory/4676-138-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/4676-141-0x00000000751A0000-0x0000000075751000-memory.dmpFilesize
5.7MB
-
memory/4832-150-0x0000000000000000-mapping.dmp
-
memory/4832-151-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/4832-153-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/4832-154-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/4832-156-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB