Analysis
-
max time kernel
182s -
max time network
214s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 17:25
Static task
static1
Behavioral task
behavioral1
Sample
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe
Resource
win10v2004-20221111-en
General
-
Target
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe
-
Size
814KB
-
MD5
401072f6b087f742d80cb9b6f4394141
-
SHA1
58024ebb3fd04470984581b4cdafd732748774e1
-
SHA256
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
-
SHA512
422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
SSDEEP
12288:LmQZ4NUMNEUHLsrUYVcYkzot2bdOHOJWZDFonFucyJoES+AXV:ZZ4CreJYVcYYoD2OAXV
Malware Config
Signatures
-
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/380-66-0x00000000024F0000-0x0000000002580000-memory.dmp MailPassView behavioral1/memory/380-69-0x0000000076FA0000-0x0000000077120000-memory.dmp MailPassView behavioral1/memory/1228-101-0x0000000000480000-0x0000000000510000-memory.dmp MailPassView behavioral1/memory/1228-100-0x0000000000482000-0x000000000050A000-memory.dmp MailPassView behavioral1/memory/1228-103-0x0000000076FA0000-0x0000000077120000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 5 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/380-66-0x00000000024F0000-0x0000000002580000-memory.dmp WebBrowserPassView behavioral1/memory/380-69-0x0000000076FA0000-0x0000000077120000-memory.dmp WebBrowserPassView behavioral1/memory/1228-101-0x0000000000480000-0x0000000000510000-memory.dmp WebBrowserPassView behavioral1/memory/1228-100-0x0000000000482000-0x000000000050A000-memory.dmp WebBrowserPassView behavioral1/memory/1228-103-0x0000000076FA0000-0x0000000077120000-memory.dmp WebBrowserPassView -
Nirsoft 5 IoCs
Processes:
resource yara_rule behavioral1/memory/380-66-0x00000000024F0000-0x0000000002580000-memory.dmp Nirsoft behavioral1/memory/380-69-0x0000000076FA0000-0x0000000077120000-memory.dmp Nirsoft behavioral1/memory/1228-101-0x0000000000480000-0x0000000000510000-memory.dmp Nirsoft behavioral1/memory/1228-100-0x0000000000482000-0x000000000050A000-memory.dmp Nirsoft behavioral1/memory/1228-103-0x0000000076FA0000-0x0000000077120000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
Processes:
Windows Update.exeWindows Update.exepid process 900 Windows Update.exe 1228 Windows Update.exe -
Deletes itself 1 IoCs
Processes:
Windows Update.exepid process 1228 Windows Update.exe -
Loads dropped DLL 8 IoCs
Processes:
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exeWindows Update.exeWindows Update.exepid process 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 900 Windows Update.exe 900 Windows Update.exe 900 Windows Update.exe 900 Windows Update.exe 1228 Windows Update.exe 1228 Windows Update.exe 1228 Windows Update.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exeWindows Update.exedescription pid process target process PID 1484 set thread context of 380 1484 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe PID 900 set thread context of 1228 900 Windows Update.exe Windows Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exeWindows Update.exepid process 1484 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 900 Windows Update.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exeWindows Update.exepid process 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 1228 Windows Update.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exeWindows Update.exedescription pid process target process PID 1484 wrote to memory of 380 1484 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe PID 1484 wrote to memory of 380 1484 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe PID 1484 wrote to memory of 380 1484 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe PID 1484 wrote to memory of 380 1484 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe PID 380 wrote to memory of 900 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe Windows Update.exe PID 380 wrote to memory of 900 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe Windows Update.exe PID 380 wrote to memory of 900 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe Windows Update.exe PID 380 wrote to memory of 900 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe Windows Update.exe PID 380 wrote to memory of 900 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe Windows Update.exe PID 380 wrote to memory of 900 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe Windows Update.exe PID 380 wrote to memory of 900 380 8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe Windows Update.exe PID 900 wrote to memory of 1228 900 Windows Update.exe Windows Update.exe PID 900 wrote to memory of 1228 900 Windows Update.exe Windows Update.exe PID 900 wrote to memory of 1228 900 Windows Update.exe Windows Update.exe PID 900 wrote to memory of 1228 900 Windows Update.exe Windows Update.exe PID 900 wrote to memory of 1228 900 Windows Update.exe Windows Update.exe PID 900 wrote to memory of 1228 900 Windows Update.exe Windows Update.exe PID 900 wrote to memory of 1228 900 Windows Update.exe Windows Update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe"C:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exeC:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe"2⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\Windows Update.exeC:\Users\Admin\AppData\Roaming\Windows Update.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of UnmapMainImage
PID:1228
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD590e596ae92585afa71957195fcbdbf1e
SHA1769dd1aedfcc1b9234d5c07d519b940f64a1ac14
SHA2566386532d676f4127450c995f0c6797b27fac96f88edab9d36f25d047ec439d9c
SHA5128e6de26a62a6bf6d174df032aba8ee9fb40f4cb925c35b4a92d4707611ea5f3177a0a8dffb47b90f30689af2fdfb01b570afbc47fafaaeff16e6f2f4a31e292d
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375
-
Filesize
814KB
MD5401072f6b087f742d80cb9b6f4394141
SHA158024ebb3fd04470984581b4cdafd732748774e1
SHA2568b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f
SHA512422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375