Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-02-2023 16:01
Static task
static1
Behavioral task
behavioral1
Sample
recoverit_pr_setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
recoverit_pr_setup.exe
Resource
win10v2004-20221111-en
General
-
Target
recoverit_pr_setup.exe
-
Size
491KB
-
MD5
af10d0f3f2fa79ba3051c2a96262b065
-
SHA1
88cf689dc6220a368dc5daaede70ea1fc5ffdb09
-
SHA256
320bf1b89342b15959fb29c944089d8d6e3c23108cdced1c912b0ea639000ba7
-
SHA512
4feb7c9f2d25486f5848dcd62e03030af99f0b077d91696a567bb60eed73f87a357896af616c778bf4f12d053b2108c861d54c43b1a8ba1a4ad1784030f8fdab
-
SSDEEP
6144:eoOL6qi0cPHdUgJVwqbPQkHp8jdbAIcTA3S7j6gk5oTIs5TeUQr:eF2qi9WgJtPfHqRb9mYSn61+ISTfQr
Malware Config
Extracted
laplas
45.159.189.105
-
api_key
b208717c54146010ab89e628591e2a7b11493ef1c593e7b3f15b1c06b1778d59
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 964 rundll32.exe 3 964 rundll32.exe 4 964 rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 824 5EB4.tmp.exe 628 673D.tmp.exe -
Loads dropped DLL 6 IoCs
pid Process 964 rundll32.exe 964 rundll32.exe 964 rundll32.exe 964 rundll32.exe 1716 Process not Found 1716 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 964 rundll32.exe 964 rundll32.exe 964 rundll32.exe 964 rundll32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 988 wrote to memory of 964 988 recoverit_pr_setup.exe 27 PID 988 wrote to memory of 964 988 recoverit_pr_setup.exe 27 PID 988 wrote to memory of 964 988 recoverit_pr_setup.exe 27 PID 988 wrote to memory of 964 988 recoverit_pr_setup.exe 27 PID 628 wrote to memory of 1852 628 673D.tmp.exe 31 PID 628 wrote to memory of 1852 628 673D.tmp.exe 31 PID 628 wrote to memory of 1852 628 673D.tmp.exe 31 PID 1852 wrote to memory of 1960 1852 cmd.exe 33 PID 1852 wrote to memory of 1960 1852 cmd.exe 33 PID 1852 wrote to memory of 1960 1852 cmd.exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\recoverit_pr_setup.exe"C:\Users\Admin\AppData\Local\Temp\recoverit_pr_setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\system32\rundll32.exe"C:\Users\Admin\AppData\Roaming\vcredist_6c06e4.dll",Options_RunDLL 0900cc00-0140-0448-0e2c-4c55ae341b6e2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\5EB4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\5EB4.tmp.exe"1⤵
- Executes dropped EXE
PID:824
-
C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5f0754f63e24b034efb7005438d01eff5
SHA1bdef226c5feb1d958a4e6c7235390b3ea41a4ae9
SHA256ecbe37472148c79ed02a8f5e419e869e6fe24ca5caccdf22c5a1fa798e624d1e
SHA51208070fc24e85b091863708bb46d9fb1229f19627c59fbd8a40f05e5b209ca651d6568464b7ceec54801f85fbc7e3a367bcc4b3cfaff4510f2a521b6239527605
-
Filesize
3.8MB
MD5f0754f63e24b034efb7005438d01eff5
SHA1bdef226c5feb1d958a4e6c7235390b3ea41a4ae9
SHA256ecbe37472148c79ed02a8f5e419e869e6fe24ca5caccdf22c5a1fa798e624d1e
SHA51208070fc24e85b091863708bb46d9fb1229f19627c59fbd8a40f05e5b209ca651d6568464b7ceec54801f85fbc7e3a367bcc4b3cfaff4510f2a521b6239527605
-
Filesize
7.4MB
MD508b674674a2c3ff6fb05ed714e1ece69
SHA13f8cac6efae08b132f234ae8ecaa13954254c2eb
SHA25695034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071
SHA5127d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f
-
Filesize
7.4MB
MD508b674674a2c3ff6fb05ed714e1ece69
SHA13f8cac6efae08b132f234ae8ecaa13954254c2eb
SHA25695034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071
SHA5127d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f
-
Filesize
53KB
MD582888955f9dd51088f355d550e0f957b
SHA12ca31d77cc2b96ba6bdd61473237114932af3d11
SHA256318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef
SHA512212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed
-
Filesize
7.4MB
MD508b674674a2c3ff6fb05ed714e1ece69
SHA13f8cac6efae08b132f234ae8ecaa13954254c2eb
SHA25695034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071
SHA5127d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f
-
Filesize
7.4MB
MD508b674674a2c3ff6fb05ed714e1ece69
SHA13f8cac6efae08b132f234ae8ecaa13954254c2eb
SHA25695034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071
SHA5127d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f
-
Filesize
53KB
MD582888955f9dd51088f355d550e0f957b
SHA12ca31d77cc2b96ba6bdd61473237114932af3d11
SHA256318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef
SHA512212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed
-
Filesize
53KB
MD582888955f9dd51088f355d550e0f957b
SHA12ca31d77cc2b96ba6bdd61473237114932af3d11
SHA256318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef
SHA512212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed
-
Filesize
53KB
MD582888955f9dd51088f355d550e0f957b
SHA12ca31d77cc2b96ba6bdd61473237114932af3d11
SHA256318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef
SHA512212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed
-
Filesize
53KB
MD582888955f9dd51088f355d550e0f957b
SHA12ca31d77cc2b96ba6bdd61473237114932af3d11
SHA256318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef
SHA512212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed