Analysis
-
max time kernel
96s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe
Resource
win10v2004-20221111-en
General
-
Target
7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe
-
Size
320KB
-
MD5
66d9be0911d76a81023425de72f109dc
-
SHA1
7d2108216ed6e41a2eb8448f462f7d03e7ccab09
-
SHA256
b6369635796fb8c318edbd1daa3d74816587157bf8b762c2d785ea7ccd10ad4c
-
SHA512
7139c7e34e15d4d91f4f7f050f78142b2bd5efb257cc0ad670e0b521235d258c90be7ff93df84948936da99a9c0f1a0d54019fa22bc3dfc1b62d3afb4ff96ed3
-
SSDEEP
6144:/Ya6jmEX6zkPvbjVRK45wtXrqUWmnWrY7JR2UoUOu05zWAFCFA:/YZmEX6avbj3KVtbVFRHz0ZWAoFA
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1756 fmjbpcgib.exe 1900 fmjbpcgib.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fmjbpcgib.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fmjbpcgib.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fmjbpcgib.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dvxdlis = "C:\\Users\\Admin\\AppData\\Roaming\\cvfqmhtledyj\\yvrkcexgd.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\fmjbpcgib.exe\" C:\\Users\\Admin\\AppData" fmjbpcgib.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 1900 1756 fmjbpcgib.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1756 fmjbpcgib.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1900 fmjbpcgib.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1756 4296 7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe 79 PID 4296 wrote to memory of 1756 4296 7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe 79 PID 4296 wrote to memory of 1756 4296 7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe 79 PID 1756 wrote to memory of 1900 1756 fmjbpcgib.exe 80 PID 1756 wrote to memory of 1900 1756 fmjbpcgib.exe 80 PID 1756 wrote to memory of 1900 1756 fmjbpcgib.exe 80 PID 1756 wrote to memory of 1900 1756 fmjbpcgib.exe 80 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fmjbpcgib.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fmjbpcgib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe"C:\Users\Admin\AppData\Local\Temp\7d2108216ed6e41a2eb8448f462f7d03e7ccab09.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe"C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe" C:\Users\Admin\AppData\Local\Temp\ysgukxfxyde.pnu2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe"C:\Users\Admin\AppData\Local\Temp\fmjbpcgib.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1900
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5709c0afda2dec429ff724b085d7a36c6
SHA1986023717c44cf311aa8d1b9eb9be0dbce7dd763
SHA2565571ae1c76a7d4ddd3f535060ef4708dde8a230ce87910c0829905c60b6a9c43
SHA512f6e7b69068cb0d712c62ddd00998e589baee5f4eb44ae8ea5337c43aac5bb5c04be2afa3ba95f593f714177b1e2cfe9cb82df03cf73008bc0c761e1bcb21f5be
-
Filesize
113KB
MD5709c0afda2dec429ff724b085d7a36c6
SHA1986023717c44cf311aa8d1b9eb9be0dbce7dd763
SHA2565571ae1c76a7d4ddd3f535060ef4708dde8a230ce87910c0829905c60b6a9c43
SHA512f6e7b69068cb0d712c62ddd00998e589baee5f4eb44ae8ea5337c43aac5bb5c04be2afa3ba95f593f714177b1e2cfe9cb82df03cf73008bc0c761e1bcb21f5be
-
Filesize
113KB
MD5709c0afda2dec429ff724b085d7a36c6
SHA1986023717c44cf311aa8d1b9eb9be0dbce7dd763
SHA2565571ae1c76a7d4ddd3f535060ef4708dde8a230ce87910c0829905c60b6a9c43
SHA512f6e7b69068cb0d712c62ddd00998e589baee5f4eb44ae8ea5337c43aac5bb5c04be2afa3ba95f593f714177b1e2cfe9cb82df03cf73008bc0c761e1bcb21f5be
-
Filesize
263KB
MD5d829f73922d50759174482145678cd50
SHA12c72fdb7b162bba3c99d1181516dddc9a7aecc0a
SHA256b0cefeba6a45686fba99bb9c1ac2ce562a9eed816fb60c0ab26c84cb1f62f18e
SHA512734b215705c14de2a4543b7c0039052ed3250536a3fee7dc240b6a1ef2979a50d8767422af68056ec84536df2bf5181545a9338588e2b644d2f27a14c018fee2
-
Filesize
7KB
MD5a37fa55436a00c5859b2033b866b461b
SHA14e943d8c811a76e2161eeb98bfffde9d24060214
SHA2564c5c2757d68d95ba400e04114532da698cd847a870baf3f257f2befb13116a6c
SHA512ddd570a365765fc1eca09ecc267fb7a1113ecbf3a5ca5e05fee9acb35068398d88e516eb571c8b402dab7d1d248355516db85aae83fbe456e8aed12555c5b944