Analysis
-
max time kernel
170s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 07:50
Static task
static1
Behavioral task
behavioral1
Sample
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe
Resource
win10v2004-20221111-en
General
-
Target
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe
-
Size
562KB
-
MD5
898ef852ab68d02e36300b2e07e696fe
-
SHA1
564e18049c7962e6f9640ac30eebd9906651432d
-
SHA256
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25
-
SHA512
43d278784d2cbb7a0ce34e1b1023e2acc9da6d78cfa361fb126bd62edbb919b8e7a2e1a374a8631a9e16bd60d2fe91c38289cc05ebe0fa8e96dff0cb2f17bc89
-
SSDEEP
12288:4My9E1SnPKqz35dxs50H3yLs7C109Zoir1FkGsrsKfCEvHom+K/RHekSF5G2:4MUrX35dWmYmzuir1FGsMCvm7HG53
Malware Config
Signatures
-
NirSoft MailPassView 8 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/3128-140-0x0000000000000000-mapping.dmp MailPassView behavioral2/memory/3128-141-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/3128-143-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/3128-142-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/3368-149-0x0000000000000000-mapping.dmp MailPassView behavioral2/memory/3368-150-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3368-152-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3368-153-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 9 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/3128-140-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/3128-141-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/3128-143-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/3128-142-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/2772-154-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/2772-155-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/2772-157-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/2772-158-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/2772-160-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 13 IoCs
Processes:
resource yara_rule behavioral2/memory/3128-140-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/3128-141-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/3128-143-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/3128-142-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/3368-149-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/3368-150-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3368-152-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3368-153-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/2772-154-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/2772-155-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/2772-157-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/2772-158-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/2772-160-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\HxXtlhgW.exe" 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\HxXtlhgW.exe" reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 47 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exedescription pid process target process PID 1916 set thread context of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 3128 set thread context of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 set thread context of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
vbc.exe8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exepid process 2772 vbc.exe 2772 vbc.exe 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exedescription pid process Token: SeDebugPrivilege 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exepid process 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.execsc.execmd.exe8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exedescription pid process target process PID 1916 wrote to memory of 3732 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe csc.exe PID 1916 wrote to memory of 3732 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe csc.exe PID 1916 wrote to memory of 3732 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe csc.exe PID 3732 wrote to memory of 3172 3732 csc.exe cvtres.exe PID 3732 wrote to memory of 3172 3732 csc.exe cvtres.exe PID 3732 wrote to memory of 3172 3732 csc.exe cvtres.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 3128 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe PID 1916 wrote to memory of 4732 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe cmd.exe PID 1916 wrote to memory of 4732 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe cmd.exe PID 1916 wrote to memory of 4732 1916 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe cmd.exe PID 4732 wrote to memory of 1760 4732 cmd.exe reg.exe PID 4732 wrote to memory of 1760 4732 cmd.exe reg.exe PID 4732 wrote to memory of 1760 4732 cmd.exe reg.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 3368 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe PID 3128 wrote to memory of 2772 3128 8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe"C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mwqezls7.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B45.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3B44.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe"C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\HxXtlhgW.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\HxXtlhgW.exe3⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES3B45.tmpFilesize
1KB
MD5a5ee890ccb19f125a50488961bad402a
SHA134ca141c95e610b6186de934ffe605614765eeee
SHA2569989b0efae6d68202862af8c55f140432d3d8d1a59ace4590178603e79154766
SHA512066304a45b255d6800389452db895df491e5f3af1e7cafc1ddb39b4144bb0245852efa7f7449427b72d90db5fe39e8d8e37ac77ff2c736f9aa75b76e015bedaa
-
C:\Users\Admin\AppData\Local\Temp\holderwb.txtFilesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
C:\Users\Admin\AppData\Local\Temp\mwqezls7.dllFilesize
1.1MB
MD5203894498a1da31910c04446c2e5ece1
SHA168ff3a137817caa46fdc03eb7d27f2aece89ca98
SHA256fa649f6d722274577c6c2b03786a6561941c2d1a13c3abe41f218e469e8125a3
SHA51281bb71114b021b51e488f43bf03ec5dc6b9cbbe9354f281040bcc54f223fa2899c26763b414c75ecdf1f2d61753fe6c3b324cf5919fcc82da5d40d4fed8225ad
-
\??\c:\Users\Admin\AppData\Local\Temp\CSC3B44.tmpFilesize
652B
MD5966fea66b4df31c241bb60c810925dae
SHA136ffdcf23002dd13e307c6d73190cf1f3f594635
SHA2566941cf40e15916d966f5ff5b12d0da1a395a850dd54bf1a3c2911585352a7188
SHA512175dfe15005f36ba51247e8a063f2e9aa2a446cbac34643fea91a5f68e000dc7d1afd44163a3d35a2e4f84486a70b5d901f90337aba286f7a1785d3465cc7b01
-
\??\c:\Users\Admin\AppData\Local\Temp\mwqezls7.cmdlineFilesize
195B
MD50dc989408041ef68fcbc6c4340921c7d
SHA10b6f8ee970a25a99fb7d64287e12eb4ff4f48f71
SHA25608854029b47dcd0a3285feb88b2f51e1e6d46d3ad89e3862f90ee6fae64dfebd
SHA51200f3169fbc3a6a6b1c3755b7105550938160d28c3ad6814b848eafa32ba3d4143676aa43f27328f58bea7f8d1554355378e6bd2f1933f4c4afbc3729b3957016
-
\??\c:\Users\Admin\AppData\Local\Temp\tmp659.tmp.txtFilesize
551KB
MD501082166169ab352b62b7dfe5e40ce37
SHA1cf3cf6bf578afabb77f5f53960a6adebd6f9f37c
SHA256f5d003a70496052da6a8ae94c2a5da2f1ceced0ba0208f7db451a1ccc1dd6ca5
SHA5124838105ebb3a92ee02488da8abd5add8a9da108d57a3ee593562ad0766337db776860cf05d0085138dbdcedf5dd5b3372fa8a80b588384bed1caf82f315eb050
-
memory/1760-146-0x0000000000000000-mapping.dmp
-
memory/1916-132-0x00000000748F0000-0x0000000074EA1000-memory.dmpFilesize
5.7MB
-
memory/2772-155-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2772-157-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2772-154-0x0000000000000000-mapping.dmp
-
memory/2772-158-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2772-160-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/3128-143-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/3128-147-0x00000000748F0000-0x0000000074EA1000-memory.dmpFilesize
5.7MB
-
memory/3128-148-0x00000000748F0000-0x0000000074EA1000-memory.dmpFilesize
5.7MB
-
memory/3128-142-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/3128-141-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/3128-140-0x0000000000000000-mapping.dmp
-
memory/3172-136-0x0000000000000000-mapping.dmp
-
memory/3368-152-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/3368-153-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/3368-150-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/3368-149-0x0000000000000000-mapping.dmp
-
memory/3732-133-0x0000000000000000-mapping.dmp
-
memory/4732-145-0x0000000000000000-mapping.dmp