Analysis

  • max time kernel
    96s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2023, 13:03

General

  • Target

    7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe

  • Size

    320KB

  • MD5

    66d9be0911d76a81023425de72f109dc

  • SHA1

    7d2108216ed6e41a2eb8448f462f7d03e7ccab09

  • SHA256

    b6369635796fb8c318edbd1daa3d74816587157bf8b762c2d785ea7ccd10ad4c

  • SHA512

    7139c7e34e15d4d91f4f7f050f78142b2bd5efb257cc0ad670e0b521235d258c90be7ff93df84948936da99a9c0f1a0d54019fa22bc3dfc1b62d3afb4ff96ed3

  • SSDEEP

    6144:/Ya6jmEX6zkPvbjVRK45wtXrqUWmnWrY7JR2UoUOu05zWAFCFA:/YZmEX6avbj3KVtbVFRHz0ZWAoFA

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe
    "C:\Users\Admin\AppData\Local\Temp\7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe
      "C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe" C:\Users\Admin\AppData\Local\Temp\ysgukxfxyde.pnu
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe
        "C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe

    Filesize

    113KB

    MD5

    709c0afda2dec429ff724b085d7a36c6

    SHA1

    986023717c44cf311aa8d1b9eb9be0dbce7dd763

    SHA256

    5571ae1c76a7d4ddd3f535060ef4708dde8a230ce87910c0829905c60b6a9c43

    SHA512

    f6e7b69068cb0d712c62ddd00998e589baee5f4eb44ae8ea5337c43aac5bb5c04be2afa3ba95f593f714177b1e2cfe9cb82df03cf73008bc0c761e1bcb21f5be

  • C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe

    Filesize

    113KB

    MD5

    709c0afda2dec429ff724b085d7a36c6

    SHA1

    986023717c44cf311aa8d1b9eb9be0dbce7dd763

    SHA256

    5571ae1c76a7d4ddd3f535060ef4708dde8a230ce87910c0829905c60b6a9c43

    SHA512

    f6e7b69068cb0d712c62ddd00998e589baee5f4eb44ae8ea5337c43aac5bb5c04be2afa3ba95f593f714177b1e2cfe9cb82df03cf73008bc0c761e1bcb21f5be

  • C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe

    Filesize

    113KB

    MD5

    709c0afda2dec429ff724b085d7a36c6

    SHA1

    986023717c44cf311aa8d1b9eb9be0dbce7dd763

    SHA256

    5571ae1c76a7d4ddd3f535060ef4708dde8a230ce87910c0829905c60b6a9c43

    SHA512

    f6e7b69068cb0d712c62ddd00998e589baee5f4eb44ae8ea5337c43aac5bb5c04be2afa3ba95f593f714177b1e2cfe9cb82df03cf73008bc0c761e1bcb21f5be

  • C:\Users\Admin\AppData\Local\Temp\remlobc.j

    Filesize

    263KB

    MD5

    d829f73922d50759174482145678cd50

    SHA1

    2c72fdb7b162bba3c99d1181516dddc9a7aecc0a

    SHA256

    b0cefeba6a45686fba99bb9c1ac2ce562a9eed816fb60c0ab26c84cb1f62f18e

    SHA512

    734b215705c14de2a4543b7c0039052ed3250536a3fee7dc240b6a1ef2979a50d8767422af68056ec84536df2bf5181545a9338588e2b644d2f27a14c018fee2

  • C:\Users\Admin\AppData\Local\Temp\ysgukxfxyde.pnu

    Filesize

    7KB

    MD5

    a37fa55436a00c5859b2033b866b461b

    SHA1

    4e943d8c811a76e2161eeb98bfffde9d24060214

    SHA256

    4c5c2757d68d95ba400e04114532da698cd847a870baf3f257f2befb13116a6c

    SHA512

    ddd570a365765fc1eca09ecc267fb7a1113ecbf3a5ca5e05fee9acb35068398d88e516eb571c8b402dab7d1d248355516db85aae83fbe456e8aed12555c5b944

  • memory/1900-139-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1900-140-0x0000000004960000-0x0000000004F04000-memory.dmp

    Filesize

    5.6MB

  • memory/1900-141-0x00000000048A0000-0x0000000004906000-memory.dmp

    Filesize

    408KB

  • memory/1900-142-0x0000000005E20000-0x0000000005EB2000-memory.dmp

    Filesize

    584KB

  • memory/1900-143-0x0000000005F00000-0x0000000005F0A000-memory.dmp

    Filesize

    40KB

  • memory/1900-144-0x00000000060E0000-0x0000000006130000-memory.dmp

    Filesize

    320KB

  • memory/1900-145-0x0000000006130000-0x00000000062F2000-memory.dmp

    Filesize

    1.8MB