Analysis
-
max time kernel
94s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe
Resource
win10v2004-20220812-en
General
-
Target
aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe
-
Size
444KB
-
MD5
2315569cff2071f661a90c14cabe20de
-
SHA1
2b36f2e531aa318c695bbc699c3b533c50d1223d
-
SHA256
aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5
-
SHA512
96a890c5e82285a390a498294eb94ead6ce879443ceab25031c1acd918879a879a148b7861e12637f8bc4e2926141517eb064ba3261ba0f80accc5136f0360f3
-
SSDEEP
6144:fZ8QY5e1PSzcdHfcaByw9B8BOI2xzVVu/dYR2XUtyUQYoIaRrgkM6Ovf4y9Izj:fyVeXd/c3FWzvW6R2Et5FapgOMQy9I
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
azerty25cendrey
Signatures
-
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1064-82-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1064-83-0x0000000000411654-mapping.dmp MailPassView behavioral1/memory/1064-86-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1064-87-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1064-89-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
Nirsoft 9 IoCs
resource yara_rule behavioral1/memory/1428-67-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/1428-68-0x000000000040E758-mapping.dmp Nirsoft behavioral1/memory/1428-71-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/1428-72-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/1064-82-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1064-83-0x0000000000411654-mapping.dmp Nirsoft behavioral1/memory/1064-86-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1064-87-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1064-89-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\winds32 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winds32.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1080 set thread context of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 set thread context of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1744 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 28 PID 1080 wrote to memory of 1744 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 28 PID 1080 wrote to memory of 1744 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 28 PID 1080 wrote to memory of 1744 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 28 PID 1080 wrote to memory of 1568 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 30 PID 1080 wrote to memory of 1568 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 30 PID 1080 wrote to memory of 1568 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 30 PID 1080 wrote to memory of 1568 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 30 PID 1568 wrote to memory of 1396 1568 cmd.exe 32 PID 1568 wrote to memory of 1396 1568 cmd.exe 32 PID 1568 wrote to memory of 1396 1568 cmd.exe 32 PID 1568 wrote to memory of 1396 1568 cmd.exe 32 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1428 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 33 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35 PID 1080 wrote to memory of 1064 1080 aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe"C:\Users\Admin\AppData\Local\Temp\aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /z "C:\Users\Admin\AppData\Local\Temp\aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aa5a39e75c358fd3019729469c6805feb3b1421b12f859ee4e8641f823af92f5.exe"2⤵
- Drops startup file
PID:1744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "winds32" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winds32.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "winds32" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winds32.exe3⤵
- Adds Run key to start application
PID:1396
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt2⤵PID:1428
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt2⤵
- Accesses Microsoft Outlook accounts
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84