Analysis
-
max time kernel
151s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 17:31
Static task
static1
Behavioral task
behavioral1
Sample
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe
Resource
win7-20221111-en
General
-
Target
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe
-
Size
818KB
-
MD5
370d9823164b3e2d07447851db75c80d
-
SHA1
30a9b34ae7600c776326a413823983c6d28d3e27
-
SHA256
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
-
SHA512
278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
SSDEEP
12288:PARn9Ur93VDNqvaHg8IeRfTcdhP2FQHw5Nh4/AioaioBiVO7zW:W9i93DxCeRAdhPup/43JzW
Malware Config
Signatures
-
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/604-66-0x00000000065F0000-0x0000000006680000-memory.dmp MailPassView behavioral1/memory/604-69-0x0000000077450000-0x00000000775D0000-memory.dmp MailPassView behavioral1/memory/340-99-0x00000000002F0000-0x0000000000380000-memory.dmp MailPassView behavioral1/memory/340-98-0x00000000002F2000-0x000000000037A000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/604-66-0x00000000065F0000-0x0000000006680000-memory.dmp WebBrowserPassView behavioral1/memory/604-69-0x0000000077450000-0x00000000775D0000-memory.dmp WebBrowserPassView behavioral1/memory/340-99-0x00000000002F0000-0x0000000000380000-memory.dmp WebBrowserPassView behavioral1/memory/340-98-0x00000000002F2000-0x000000000037A000-memory.dmp WebBrowserPassView -
Nirsoft 4 IoCs
Processes:
resource yara_rule behavioral1/memory/604-66-0x00000000065F0000-0x0000000006680000-memory.dmp Nirsoft behavioral1/memory/604-69-0x0000000077450000-0x00000000775D0000-memory.dmp Nirsoft behavioral1/memory/340-99-0x00000000002F0000-0x0000000000380000-memory.dmp Nirsoft behavioral1/memory/340-98-0x00000000002F2000-0x000000000037A000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
Processes:
Windows Update.exeWindows Update.exepid process 868 Windows Update.exe 340 Windows Update.exe -
Deletes itself 1 IoCs
Processes:
Windows Update.exepid process 340 Windows Update.exe -
Loads dropped DLL 8 IoCs
Processes:
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exeWindows Update.exeWindows Update.exepid process 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 868 Windows Update.exe 868 Windows Update.exe 868 Windows Update.exe 868 Windows Update.exe 340 Windows Update.exe 340 Windows Update.exe 340 Windows Update.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 whatismyipaddress.com 6 whatismyipaddress.com 7 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exeWindows Update.exedescription pid process target process PID 2036 set thread context of 604 2036 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe PID 868 set thread context of 340 868 Windows Update.exe Windows Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Windows Update.exedescription pid process Token: SeDebugPrivilege 340 Windows Update.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exeWindows Update.exeWindows Update.exepid process 2036 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 868 Windows Update.exe 340 Windows Update.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exeWindows Update.exepid process 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 340 Windows Update.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exeWindows Update.exedescription pid process target process PID 2036 wrote to memory of 604 2036 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe PID 2036 wrote to memory of 604 2036 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe PID 2036 wrote to memory of 604 2036 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe PID 2036 wrote to memory of 604 2036 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe PID 604 wrote to memory of 868 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe Windows Update.exe PID 604 wrote to memory of 868 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe Windows Update.exe PID 604 wrote to memory of 868 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe Windows Update.exe PID 604 wrote to memory of 868 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe Windows Update.exe PID 604 wrote to memory of 868 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe Windows Update.exe PID 604 wrote to memory of 868 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe Windows Update.exe PID 604 wrote to memory of 868 604 1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe Windows Update.exe PID 868 wrote to memory of 340 868 Windows Update.exe Windows Update.exe PID 868 wrote to memory of 340 868 Windows Update.exe Windows Update.exe PID 868 wrote to memory of 340 868 Windows Update.exe Windows Update.exe PID 868 wrote to memory of 340 868 Windows Update.exe Windows Update.exe PID 868 wrote to memory of 340 868 Windows Update.exe Windows Update.exe PID 868 wrote to memory of 340 868 Windows Update.exe Windows Update.exe PID 868 wrote to memory of 340 868 Windows Update.exe Windows Update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe"C:\Users\Admin\AppData\Local\Temp\1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exeC:\Users\Admin\AppData\Local\Temp\1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc.exe"2⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeC:\Users\Admin\AppData\Roaming\Windows Update.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
102B
MD55f12810b8754eac1e93973ab585b59bc
SHA1548d9230c02f01013f59005c27ced1a6148fe635
SHA256ba4814970e9eb30acc206feb932303c7add37fb552a7b628f6d6fe11f28fa96f
SHA5126c50c2e6399127bc7df86e5a17ff846a717fdfb523ed0fbd82667d90d9fab9c0b61ad420d595e79f02e9350cecb339afa90172b52fdf7bb193d6b8b7197a8a68
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
818KB
MD5370d9823164b3e2d07447851db75c80d
SHA130a9b34ae7600c776326a413823983c6d28d3e27
SHA2561aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc
SHA512278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db
-
memory/340-98-0x00000000002F2000-0x000000000037A000-memory.dmpFilesize
544KB
-
memory/340-94-0x0000000000400000-0x0000000000477000-memory.dmpFilesize
476KB
-
memory/340-108-0x0000000074250000-0x00000000747FB000-memory.dmpFilesize
5.7MB
-
memory/340-107-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/340-106-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/340-104-0x0000000074250000-0x00000000747FB000-memory.dmpFilesize
5.7MB
-
memory/340-103-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/340-102-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/340-101-0x0000000008D70000-0x0000000009868000-memory.dmpFilesize
11.0MB
-
memory/340-85-0x00000000004AB743-mapping.dmp
-
memory/340-99-0x00000000002F0000-0x0000000000380000-memory.dmpFilesize
576KB
-
memory/604-70-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/604-76-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/604-69-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/604-71-0x0000000074610000-0x0000000074BBB000-memory.dmpFilesize
5.7MB
-
memory/604-58-0x00000000004AB743-mapping.dmp
-
memory/604-63-0x0000000000400000-0x0000000000477000-memory.dmpFilesize
476KB
-
memory/604-66-0x00000000065F0000-0x0000000006680000-memory.dmpFilesize
576KB
-
memory/604-77-0x0000000074610000-0x0000000074BBB000-memory.dmpFilesize
5.7MB
-
memory/868-73-0x0000000000000000-mapping.dmp
-
memory/868-88-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/2036-56-0x00000000002C0000-0x00000000002C7000-memory.dmpFilesize
28KB
-
memory/2036-59-0x0000000077450000-0x00000000775D0000-memory.dmpFilesize
1.5MB
-
memory/2036-57-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB