Analysis
-
max time kernel
202s -
max time network
208s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 22:49
Behavioral task
behavioral1
Sample
42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
Resource
win10v2004-20221111-en
General
-
Target
42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
-
Size
581KB
-
MD5
32f17557fccf705069ffb76cded74107
-
SHA1
d3bfc6b076105d9232216c7b3653b2981ae8ed05
-
SHA256
42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86
-
SHA512
6f3a7ae15bfdf92da96a5ca47b9685c7e5dcaeed743fbba9c0e4a9ea829d2b959d945f551e71c963e21acba2dfc632a4e4dc23a90258bb0289126034d66b9b65
-
SSDEEP
12288:XEijOrAxZXNxwDjlENkiTNY/wS1Va9NzWny4Cy/mo05Jj+:XrxbxwDJ5iTNYJ1VWulCy/90L+
Malware Config
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/268-76-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/268-79-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/268-80-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 20 IoCs
resource yara_rule behavioral1/memory/888-61-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/888-62-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/332-69-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral1/memory/332-70-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral1/memory/268-76-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/268-79-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/268-80-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1676-87-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/1676-88-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/1676-89-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/1400-96-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral1/memory/1400-97-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral1/memory/292-104-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/292-105-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1552-106-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/1552-107-0x00000000004075AF-mapping.dmp Nirsoft behavioral1/memory/1552-110-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/1552-111-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/1948-117-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/1948-118-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft -
resource yara_rule behavioral1/memory/888-56-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/888-60-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/888-61-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/888-62-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/332-64-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/332-68-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/332-69-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/332-70-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/268-71-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/268-75-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/268-76-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1972-77-0x0000000000400000-0x00000000005E7000-memory.dmp upx behavioral1/memory/268-79-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/268-80-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1676-81-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1676-85-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1676-86-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1676-87-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1676-88-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1676-89-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1400-91-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1400-95-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1400-96-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1400-97-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/292-99-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/292-103-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/292-104-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/292-105-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/1948-112-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/1948-116-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/1948-117-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/1948-118-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1972 set thread context of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 set thread context of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 set thread context of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 set thread context of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 set thread context of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 set thread context of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 set thread context of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 set thread context of 1948 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 35 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 332 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe Token: SeDebugPrivilege 292 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe Token: SeRestorePrivilege 292 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe Token: SeBackupPrivilege 292 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 888 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 28 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 332 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 29 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 268 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 30 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1676 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 31 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 1400 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 32 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 292 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 33 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34 PID 1972 wrote to memory of 1552 1972 42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe"C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\offc.dat"2⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\mess.dat"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\mail.dat"2⤵
- Accesses Microsoft Outlook accounts
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\dial.dat"2⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\chro.dat"2⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\iexp.dat"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\ptsg.dat"2⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe/stext "C:\Users\Admin\AppData\Local\Temp\ffox.dat"2⤵PID:1948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD5e38eded07ed8eee3b7ffb2bd9729a1be
SHA11aa62e9aecbcd2e99820abb304d09b529c8932eb
SHA256ddecbc4618fbc4c5a835cc4eccf3f71b4fae1e6cc60e67e1e0b4e4e388a15255
SHA512f33ecfda1887650b107ed16014388eb18e847d5ec2aef2e9094b05860286ca973d7019bc3165c06f179a3f8a77b6eca30ea9e4edcab02b345370df3d9da80e78