Analysis

  • max time kernel
    62s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2023, 14:18

General

  • Target

    tmp.exe

  • Size

    2.8MB

  • MD5

    c8d0a1683a5446ccde142003418289ac

  • SHA1

    0c23236f995015e153efec0b02fb8c3e777f3088

  • SHA256

    1704307c4598fa8ec273bacaaaa2dfb24ac7e89dde8fd02a3e87b9f55fcdf9b6

  • SHA512

    c691ec211fe2e557a087f02ffe592509f53e31520599b5d596c019cff1d76745e3fd0d84b3025e04beed99642fab069d38d8047ae4ab32ebcf99c35b79afdd54

  • SSDEEP

    49152:mxQxMl2s1gZg+gh9bOpmfCoXEpOFlTJ8I37p8Okt9S:

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:656
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/656-62-0x000000001B2D0000-0x000000001B5B2000-memory.dmp

    Filesize

    2.9MB

  • memory/656-63-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

    Filesize

    32KB

  • memory/656-66-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/656-65-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/656-64-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/656-67-0x00000000025E0000-0x0000000002660000-memory.dmp

    Filesize

    512KB

  • memory/900-69-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB

  • memory/900-70-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB

  • memory/900-71-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB

  • memory/900-72-0x000007FFFFFDA000-0x000007FFFFFDB000-memory.dmp

    Filesize

    4KB

  • memory/900-73-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB

  • memory/900-76-0x000000001AB70000-0x000000001AC6C000-memory.dmp

    Filesize

    1008KB

  • memory/900-77-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-78-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-82-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-80-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-84-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-86-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-88-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-90-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-92-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-98-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-96-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-94-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-102-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-104-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-100-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-108-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-106-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-114-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-112-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-110-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-116-0x000000001B5B0000-0x000000001B630000-memory.dmp

    Filesize

    512KB

  • memory/900-117-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-121-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-119-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-123-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-125-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-127-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-129-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-131-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-133-0x000000001AB70000-0x000000001AC68000-memory.dmp

    Filesize

    992KB

  • memory/900-2412-0x0000000000BC0000-0x0000000000C32000-memory.dmp

    Filesize

    456KB

  • memory/900-2413-0x0000000000D10000-0x0000000000D80000-memory.dmp

    Filesize

    448KB

  • memory/900-2414-0x000000001B5B0000-0x000000001B630000-memory.dmp

    Filesize

    512KB

  • memory/900-2415-0x000000001B5B0000-0x000000001B630000-memory.dmp

    Filesize

    512KB

  • memory/900-2416-0x000000001B5B0000-0x000000001B630000-memory.dmp

    Filesize

    512KB

  • memory/900-2417-0x00000000003A0000-0x00000000003EC000-memory.dmp

    Filesize

    304KB

  • memory/900-2418-0x0000000000160000-0x0000000000180000-memory.dmp

    Filesize

    128KB

  • memory/900-2419-0x000000001B5B0000-0x000000001B630000-memory.dmp

    Filesize

    512KB

  • memory/900-2438-0x000000001BC20000-0x000000001BC9A000-memory.dmp

    Filesize

    488KB

  • memory/900-2447-0x000000001B5B0000-0x000000001B630000-memory.dmp

    Filesize

    512KB

  • memory/900-2448-0x000000001B5B0000-0x000000001B630000-memory.dmp

    Filesize

    512KB

  • memory/1240-54-0x0000000000ED0000-0x000000000119A000-memory.dmp

    Filesize

    2.8MB

  • memory/1240-55-0x000000001B280000-0x000000001B478000-memory.dmp

    Filesize

    2.0MB

  • memory/1240-56-0x0000000000C20000-0x0000000000CB2000-memory.dmp

    Filesize

    584KB

  • memory/1240-57-0x000000001B070000-0x000000001B0F0000-memory.dmp

    Filesize

    512KB