Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/03/2023, 07:29

General

  • Target

    0b2d62bf8c0f1e0bbdfdf6532c8b9c70b73411f3c907854738064d423ebf88df.exe

  • Size

    838KB

  • MD5

    f0fc210b0b39ae210d3db8834cbcf396

  • SHA1

    bf2d473dd0ce8750810b6000c4fe740485231559

  • SHA256

    0b2d62bf8c0f1e0bbdfdf6532c8b9c70b73411f3c907854738064d423ebf88df

  • SHA512

    fbfcdca2b7d336f70a19831019fc78aba9e4a11c7f5c5ad287efa4aa7bc1ec7c95a74f31a573f4bbb6c3b63991f75b5cd0a27a947e998c6246aef50c918a78ad

  • SSDEEP

    12288:n3aZ2Cap+WYcE3QLJtdNIaYL96Yn9hRXeFmZdtHvLW:fCa8cE3YJXYL5rt

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b2d62bf8c0f1e0bbdfdf6532c8b9c70b73411f3c907854738064d423ebf88df.exe
    "C:\Users\Admin\AppData\Local\Temp\0b2d62bf8c0f1e0bbdfdf6532c8b9c70b73411f3c907854738064d423ebf88df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4968
    • C:\Users\Admin\AppData\Local\Temp\0b2d62bf8c0f1e0bbdfdf6532c8b9c70b73411f3c907854738064d423ebf88df.exe
      C:\Users\Admin\AppData\Local\Temp\0b2d62bf8c0f1e0bbdfdf6532c8b9c70b73411f3c907854738064d423ebf88df.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0b2d62bf8c0f1e0bbdfdf6532c8b9c70b73411f3c907854738064d423ebf88df.exe.log

    Filesize

    2KB

    MD5

    49f48145aff306db4d0eefdb29ae6641

    SHA1

    0810463eb8b976d63487551db8652393580a76d3

    SHA256

    fe9b01c4dad3504b3941dbf7898163b9c7f0ab47f601c18dbde209cf23ea7edd

    SHA512

    d84e3707df78499023f09ebed11648a62c6d4ea24a7a90923c1e50e59c2be8c8d323634889eb8ce05f35d697cf98d0b5f9b5d0841f83b90359ea24e1f1e3b343

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_odbn4e50.mtw.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • memory/3540-117-0x0000000000990000-0x0000000000A66000-memory.dmp

    Filesize

    856KB

  • memory/3540-118-0x0000000001320000-0x0000000001330000-memory.dmp

    Filesize

    64KB

  • memory/3540-119-0x000000001E180000-0x000000001E370000-memory.dmp

    Filesize

    1.9MB

  • memory/3540-120-0x000000001E470000-0x000000001E502000-memory.dmp

    Filesize

    584KB

  • memory/3540-121-0x000000001E530000-0x000000001E552000-memory.dmp

    Filesize

    136KB

  • memory/3540-148-0x0000000001320000-0x0000000001330000-memory.dmp

    Filesize

    64KB

  • memory/4732-189-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-199-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-2536-0x000000001C4C0000-0x000000001C53A000-memory.dmp

    Filesize

    488KB

  • memory/4732-2517-0x000000001C580000-0x000000001C590000-memory.dmp

    Filesize

    64KB

  • memory/4732-159-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-160-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-162-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-164-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-166-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-168-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-170-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-172-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-174-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-176-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-179-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-178-0x000000001C580000-0x000000001C590000-memory.dmp

    Filesize

    64KB

  • memory/4732-181-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-183-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-185-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-187-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-155-0x0000000000400000-0x00000000004C6000-memory.dmp

    Filesize

    792KB

  • memory/4732-191-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-193-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-195-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-197-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-158-0x000000001C990000-0x000000001CA8C000-memory.dmp

    Filesize

    1008KB

  • memory/4732-201-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-203-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-205-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-207-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-209-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-211-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-213-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-215-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-217-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-219-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-221-0x000000001C990000-0x000000001CA88000-memory.dmp

    Filesize

    992KB

  • memory/4732-1931-0x000000001C580000-0x000000001C590000-memory.dmp

    Filesize

    64KB

  • memory/4732-2511-0x00000000031F0000-0x0000000003262000-memory.dmp

    Filesize

    456KB

  • memory/4732-2512-0x0000000003260000-0x00000000032D0000-memory.dmp

    Filesize

    448KB

  • memory/4732-2513-0x000000001C580000-0x000000001C590000-memory.dmp

    Filesize

    64KB

  • memory/4732-2514-0x000000001C580000-0x000000001C590000-memory.dmp

    Filesize

    64KB

  • memory/4732-2515-0x00000000032F0000-0x000000000333C000-memory.dmp

    Filesize

    304KB

  • memory/4732-2516-0x0000000003380000-0x00000000033A0000-memory.dmp

    Filesize

    128KB

  • memory/4968-132-0x000001FBE3830000-0x000001FBE3840000-memory.dmp

    Filesize

    64KB

  • memory/4968-131-0x000001FBE5A90000-0x000001FBE5B06000-memory.dmp

    Filesize

    472KB

  • memory/4968-130-0x000001FBE3830000-0x000001FBE3840000-memory.dmp

    Filesize

    64KB

  • memory/4968-149-0x000001FBE3830000-0x000001FBE3840000-memory.dmp

    Filesize

    64KB

  • memory/4968-150-0x000001FBE3830000-0x000001FBE3840000-memory.dmp

    Filesize

    64KB