Analysis
-
max time kernel
47s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-01-2023 19:15
Static task
static1
Behavioral task
behavioral1
Sample
0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
Resource
win10v2004-20221111-en
General
-
Target
0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
-
Size
951KB
-
MD5
a3df44994428bfe9b70f9774e76347bb
-
SHA1
0eac1f1303e55f7c0239af4b1eca3e992ed05693
-
SHA256
52ab9f2e3878dd9fa61c7bbbdfff113485fb4c12f8af0fa28b938696d68e54bb
-
SHA512
75bf4289be57495b878b06d6bc540911b31508753e8fb4ec1bbeec29dad124de9cdc75e378c657728e0d77278b8973ec5144f886b2305b8688e21572a0c20530
-
SSDEEP
24576:yli277DjOWEIycmmy7UmCJrYTSKIKTn6ALDx:UiWvhnyc7ytc
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowUpdate\\WindowUpdate.exe" 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1132 set thread context of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 2028 powershell.exe 2004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe Token: SeDebugPrivilege 1532 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2004 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 28 PID 1132 wrote to memory of 2004 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 28 PID 1132 wrote to memory of 2004 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 28 PID 1132 wrote to memory of 2004 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 28 PID 1132 wrote to memory of 2028 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 30 PID 1132 wrote to memory of 2028 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 30 PID 1132 wrote to memory of 2028 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 30 PID 1132 wrote to memory of 2028 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 30 PID 1132 wrote to memory of 1696 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 32 PID 1132 wrote to memory of 1696 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 32 PID 1132 wrote to memory of 1696 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 32 PID 1132 wrote to memory of 1696 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 32 PID 1132 wrote to memory of 836 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 34 PID 1132 wrote to memory of 836 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 34 PID 1132 wrote to memory of 836 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 34 PID 1132 wrote to memory of 836 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 34 PID 1132 wrote to memory of 1516 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 35 PID 1132 wrote to memory of 1516 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 35 PID 1132 wrote to memory of 1516 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 35 PID 1132 wrote to memory of 1516 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 35 PID 1132 wrote to memory of 1460 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 36 PID 1132 wrote to memory of 1460 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 36 PID 1132 wrote to memory of 1460 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 36 PID 1132 wrote to memory of 1460 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 36 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 PID 1132 wrote to memory of 1532 1132 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\xStBrvuHffFYx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xStBrvuHffFYx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp98A8.tmp"2⤵
- Creates scheduled task(s)
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"2⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"2⤵PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"2⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b4ffb088ef8f1ae09786e307ea8b9cd6
SHA1d74ae7ff488e271f578d039323aa668a88b0b3b5
SHA256ce4156e0ccf0fb40a9580b185670ba8b150ca9b28a200f4dc0cd91fe7997f5e4
SHA51201376ad7b8c725e6c33b0c52c3455ac5134da6f4ceba1abb5418b20c7f32c8d922260e4e8acc8489427419f732c9058834a8c2e626e058a59ba1fb8cef7fe5f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD534fc8470f94fb997d7573e300ada1181
SHA1fb847c5991c9663ed59bec680c4449bbfe841218
SHA256da114dc4f8a77af6ae7d97ee9870240ba05a7339d63bc312b84cd1374941c16f
SHA512770c8b5c34fa4000f3e74d5d16ac1a1f189fb03365f4fd13d6e720bf3f026ef8c5c5597e02c721fda49b86fcced521b8713f4830de09b75071ad52a75709bc40