Analysis
-
max time kernel
109s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2023 00:52
Static task
static1
Behavioral task
behavioral1
Sample
payment details.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
payment details.exe
Resource
win10v2004-20221111-en
General
-
Target
payment details.exe
-
Size
300KB
-
MD5
ea4e6c334095a1774cd26ee55a12938a
-
SHA1
a67620de5c43221158360ca5c62f255f4399ce71
-
SHA256
a425471f300e2f0695bce0e65277302063e3550322d01e60c4bcf3f67543b576
-
SHA512
51911750cd14decef07bd6cde48c575917eacd0231c13df76078239152448cdc6c7f42030aff62daaba6987d60afeba0c6e62021602bd10097e1513d7e176608
-
SSDEEP
6144:RYa6iERGzhhTP317oEXgulciiJY1cfWOKLOQqkv7:RYI4AhhTNrXgulctbWpOQqK7
Malware Config
Extracted
Protocol: smtp- Host:
mail.visaalliance.in - Port:
587 - Username:
[email protected] - Password:
!sm@[email protected]
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2120 tclxh.exe 2356 tclxh.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tclxh.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tclxh.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tclxh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kqblwxfdj = "C:\\Users\\Admin\\AppData\\Roaming\\usrlnwleac\\wtrmfkbaq.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tclxh.exe\" C:\\Users\\Admin\\AppData\\Local" tclxh.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 api.ipify.org 22 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2120 set thread context of 2356 2120 tclxh.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2120 tclxh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 tclxh.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 tclxh.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4372 wrote to memory of 2120 4372 payment details.exe 81 PID 4372 wrote to memory of 2120 4372 payment details.exe 81 PID 4372 wrote to memory of 2120 4372 payment details.exe 81 PID 2120 wrote to memory of 2356 2120 tclxh.exe 82 PID 2120 wrote to memory of 2356 2120 tclxh.exe 82 PID 2120 wrote to memory of 2356 2120 tclxh.exe 82 PID 2120 wrote to memory of 2356 2120 tclxh.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tclxh.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tclxh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment details.exe"C:\Users\Admin\AppData\Local\Temp\payment details.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\tclxh.exe"C:\Users\Admin\AppData\Local\Temp\tclxh.exe" C:\Users\Admin\AppData\Local\Temp\oauwqtjowgg.zxk2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\tclxh.exe"C:\Users\Admin\AppData\Local\Temp\tclxh.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2356
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD565ced2189a75445d83513fd973ff8ec6
SHA1733e5317c007134ed5c091e74b63f924fa87a5b2
SHA25632380eb63eb7efc528d3ec5aee9234a68b16d67528ed0d495a9d53441095c32c
SHA51211328d1e3312d1102c4ea493d380b651477be109be3d163444e3c22a02ffd22d4e2f80bb6aca72491aae7ce23829fc83cd44095c3f6a5f52d325146dd1ba679e
-
Filesize
7KB
MD56f2b83c546226187b091368b959eaecc
SHA15ca30b1bc16c5b77240524549c397e80f15ff35d
SHA256fab74eb15aad60343f5938e976f24ef8d3b873e8473994b73146f6e275354df8
SHA51257aecac858a28d3a6dd229ebbc4dd367e690f6fbadf40b3fdfda9e503e6d27fa33fa775e2ba3c7b3016919aa3516e114508cfcc348f912b2f7e95ed2954551f1
-
Filesize
57KB
MD549094370953727ea1b0dca78929c36cc
SHA1dba0c48314650d80035c740a83b5c36141527fc5
SHA2568c6e513d1ea9421574d73fe1bcaec222e737eb11372bbe55e7d000108e99666a
SHA5121cbe016f86f446c10496b6aa840df749b5f688c72f64c876cf5229ed311002d03ce61ee593d37fe31e53876d8c7e3b401f995f6aa2f0f0c3479b79f99f36eb82
-
Filesize
57KB
MD549094370953727ea1b0dca78929c36cc
SHA1dba0c48314650d80035c740a83b5c36141527fc5
SHA2568c6e513d1ea9421574d73fe1bcaec222e737eb11372bbe55e7d000108e99666a
SHA5121cbe016f86f446c10496b6aa840df749b5f688c72f64c876cf5229ed311002d03ce61ee593d37fe31e53876d8c7e3b401f995f6aa2f0f0c3479b79f99f36eb82
-
Filesize
57KB
MD549094370953727ea1b0dca78929c36cc
SHA1dba0c48314650d80035c740a83b5c36141527fc5
SHA2568c6e513d1ea9421574d73fe1bcaec222e737eb11372bbe55e7d000108e99666a
SHA5121cbe016f86f446c10496b6aa840df749b5f688c72f64c876cf5229ed311002d03ce61ee593d37fe31e53876d8c7e3b401f995f6aa2f0f0c3479b79f99f36eb82