Analysis

  • max time kernel
    202s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 22:49

General

  • Target

    42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe

  • Size

    581KB

  • MD5

    32f17557fccf705069ffb76cded74107

  • SHA1

    d3bfc6b076105d9232216c7b3653b2981ae8ed05

  • SHA256

    42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86

  • SHA512

    6f3a7ae15bfdf92da96a5ca47b9685c7e5dcaeed743fbba9c0e4a9ea829d2b959d945f551e71c963e21acba2dfc632a4e4dc23a90258bb0289126034d66b9b65

  • SSDEEP

    12288:XEijOrAxZXNxwDjlENkiTNY/wS1Va9NzWny4Cy/mo05Jj+:XrxbxwDJ5iTNYJ1VWulCy/90L+

Malware Config

Signatures

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • Nirsoft 20 IoCs
  • UPX packed file 32 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
    "C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
      /stext "C:\Users\Admin\AppData\Local\Temp\offc.dat"
      2⤵
        PID:888
      • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
        /stext "C:\Users\Admin\AppData\Local\Temp\mess.dat"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:332
      • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
        /stext "C:\Users\Admin\AppData\Local\Temp\mail.dat"
        2⤵
        • Accesses Microsoft Outlook accounts
        PID:268
      • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
        /stext "C:\Users\Admin\AppData\Local\Temp\dial.dat"
        2⤵
          PID:1676
        • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
          /stext "C:\Users\Admin\AppData\Local\Temp\chro.dat"
          2⤵
            PID:1400
          • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
            /stext "C:\Users\Admin\AppData\Local\Temp\iexp.dat"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:292
          • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
            /stext "C:\Users\Admin\AppData\Local\Temp\ptsg.dat"
            2⤵
              PID:1552
            • C:\Users\Admin\AppData\Local\Temp\42c8130a6b30d539cef27347f324c7722a36d096956a1c05a49eb8588860cd86.exe
              /stext "C:\Users\Admin\AppData\Local\Temp\ffox.dat"
              2⤵
                PID:1948

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\chro.dat

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Users\Admin\AppData\Local\Temp\dial.dat

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Users\Admin\AppData\Local\Temp\ffox.dat

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Users\Admin\AppData\Local\Temp\offc.dat

              Filesize

              1KB

              MD5

              e38eded07ed8eee3b7ffb2bd9729a1be

              SHA1

              1aa62e9aecbcd2e99820abb304d09b529c8932eb

              SHA256

              ddecbc4618fbc4c5a835cc4eccf3f71b4fae1e6cc60e67e1e0b4e4e388a15255

              SHA512

              f33ecfda1887650b107ed16014388eb18e847d5ec2aef2e9094b05860286ca973d7019bc3165c06f179a3f8a77b6eca30ea9e4edcab02b345370df3d9da80e78

            • memory/268-71-0x0000000000400000-0x000000000041F000-memory.dmp

              Filesize

              124KB

            • memory/268-80-0x0000000000400000-0x000000000041F000-memory.dmp

              Filesize

              124KB

            • memory/268-79-0x0000000000400000-0x000000000041F000-memory.dmp

              Filesize

              124KB

            • memory/268-76-0x0000000000400000-0x000000000041F000-memory.dmp

              Filesize

              124KB

            • memory/268-75-0x0000000000400000-0x000000000041F000-memory.dmp

              Filesize

              124KB

            • memory/292-103-0x0000000000400000-0x000000000041B000-memory.dmp

              Filesize

              108KB

            • memory/292-104-0x0000000000400000-0x000000000041B000-memory.dmp

              Filesize

              108KB

            • memory/292-99-0x0000000000400000-0x000000000041B000-memory.dmp

              Filesize

              108KB

            • memory/292-105-0x0000000000400000-0x000000000041B000-memory.dmp

              Filesize

              108KB

            • memory/332-64-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/332-68-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/332-69-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/332-70-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/888-56-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/888-62-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/888-61-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/888-60-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/888-59-0x0000000075701000-0x0000000075703000-memory.dmp

              Filesize

              8KB

            • memory/1400-96-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/1400-91-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/1400-97-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/1400-95-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/1552-111-0x0000000000400000-0x0000000000410000-memory.dmp

              Filesize

              64KB

            • memory/1552-106-0x0000000000400000-0x0000000000410000-memory.dmp

              Filesize

              64KB

            • memory/1552-110-0x0000000000400000-0x0000000000410000-memory.dmp

              Filesize

              64KB

            • memory/1676-89-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/1676-81-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/1676-88-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/1676-85-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/1676-86-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/1676-87-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/1948-112-0x0000000000400000-0x0000000000419000-memory.dmp

              Filesize

              100KB

            • memory/1948-116-0x0000000000400000-0x0000000000419000-memory.dmp

              Filesize

              100KB

            • memory/1948-117-0x0000000000400000-0x0000000000419000-memory.dmp

              Filesize

              100KB

            • memory/1948-118-0x0000000000400000-0x0000000000419000-memory.dmp

              Filesize

              100KB

            • memory/1972-78-0x0000000002750000-0x0000000002937000-memory.dmp

              Filesize

              1.9MB

            • memory/1972-77-0x0000000000400000-0x00000000005E7000-memory.dmp

              Filesize

              1.9MB