Resubmissions

01-02-2023 05:13

230201-fwfl3sca33 9

Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2023 05:13

General

  • Target

    3817bad277aa50016e08eed35e92d4a3b5247633.exe

  • Size

    876KB

  • MD5

    6b1f65c5297138a312c83c277c258bcb

  • SHA1

    3817bad277aa50016e08eed35e92d4a3b5247633

  • SHA256

    c2e98978063f02f9769d8372d10abc3fe734cd7e686c6ab5dedb08dd57076b17

  • SHA512

    213008ba436056bbeac9434f72d318c0af1a4fd4f7c082da3c32b0c1d801f3ae31208be3b2cd6e6cdaefa7728575757e7987230fb1d79895f214d4fa7b491bb1

  • SSDEEP

    24576:GKm0WEPfv82Kww5Y3awdtWs8RPrK7LBmH0I:hmtUv4bY3hh8lrB

Score
9/10

Malware Config

Signatures

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Drops startup file 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3817bad277aa50016e08eed35e92d4a3b5247633.exe
    "C:\Users\Admin\AppData\Local\Temp\3817bad277aa50016e08eed35e92d4a3b5247633.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Users\Admin\AppData\Local\Temp\3817bad277aa50016e08eed35e92d4a3b5247633.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3780
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp545B.tmp"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:2620

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp
    Filesize

    4KB

    MD5

    52211867093eff778e3dc3df6d9c4134

    SHA1

    28a3a9f8b1120ebb1a0f9bd1dd50325260376c61

    SHA256

    4a636cc2c0d4458af6252981600557e0cd4cd52f55bae619532d4b3410457d8c

    SHA512

    b940818d2a90226f7b46f269f1d9828a9c7a0c543ae68f5dca18f8d2f1d1a7ea3808a573970c9bf3348a9215a81f5b889f3af0823b65e82ef345a9eefdde924a

  • memory/2308-133-0x0000000074EE0000-0x0000000075491000-memory.dmp
    Filesize

    5.7MB

  • memory/2308-134-0x0000000074EE0000-0x0000000075491000-memory.dmp
    Filesize

    5.7MB

  • memory/2308-132-0x0000000000000000-mapping.dmp
  • memory/2620-146-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/2620-145-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/2620-142-0x0000000000000000-mapping.dmp
  • memory/2620-143-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/3780-135-0x0000000000000000-mapping.dmp
  • memory/3780-140-0x0000000000400000-0x000000000045B000-memory.dmp
    Filesize

    364KB

  • memory/3780-139-0x0000000000400000-0x000000000045B000-memory.dmp
    Filesize

    364KB

  • memory/3780-138-0x0000000000400000-0x000000000045B000-memory.dmp
    Filesize

    364KB

  • memory/3780-136-0x0000000000400000-0x000000000045B000-memory.dmp
    Filesize

    364KB