Analysis

  • max time kernel
    90s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-04-2023 06:57

General

  • Target

    FedExInvoice013.exe

  • Size

    877KB

  • MD5

    c2744c4bab87079337e5040cec0c202c

  • SHA1

    f9a492ebcd8647eb373e889329a12bc69beca10d

  • SHA256

    0663257fdd4fc2ee70895f2d46ed462472c2eb8734bd191ab37df92555276bc3

  • SHA512

    b4500903b5d30bdd558f241ac31d2405a966ef3b6444674b3b35d01741402ce08a55deeed0bbd85bbe673491a4d4ce4e7b30608e19f008b309ebc91b448ceabf

  • SSDEEP

    12288:OqxiRq8Wzhy7/G5F4MkyzlvMjSp2O28Bu7O1mwlF6jiFOhG4q3N4X5Krg:3iRKhy7/G5GMxt67/m6uJMr

Malware Config

Signatures

  • PredatorStealer

    Predator is a modular stealer written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe
    "C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe
      "C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"
      2⤵
        PID:1348
      • C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe
        "C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"
        2⤵
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:1360
        • C:\Users\Admin\AppData\Local\Temp\Zip.exe
          "C:\Users\Admin\AppData\Local\Temp\Zip.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1232

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF000206D7\ProgramList.txt

      Filesize

      4KB

      MD5

      db708091ee86de3b508496bca9178f27

      SHA1

      fa3e67e4143c48d40d66e2f1bc326c16f32c2286

      SHA256

      f46462fa4372885611f2b03780e37360f6a5f7814f797e94416d7bcad8186546

      SHA512

      a98558b01d47181f0ba8fb50622cb26a24aa8d233d0cd4b6e8a67e2c95be35ad05decbb6b2a95702858d7030b06135b7c71ddef57b4b18aca5f5c7f972c09931

    • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF000206D7\ProsessList.txt

      Filesize

      496B

      MD5

      3190d223f4a7048543dcfad5419229f7

      SHA1

      5480e0e40639115a601484323dfc31f70ee0547c

      SHA256

      50c8a8c00a38b38500fa5a7ecdc036e43f74768c32276110a38221fa583e72e7

      SHA512

      f85f2fd605e9a7836bbd3dadcc75fdb60b79013a88e03cb1ea9fe86fa08be27d57f1fe6688495b9dbd5e6a7e722f1d3ed16239f0879f0baeaa99c3b0f001ef81

    • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF000206D7\Screenshot.png

      Filesize

      391KB

      MD5

      979e52ac0e30546c682fabb3753b06ca

      SHA1

      279908e9618f8880cf76e65ccc4e1af4ce685d5c

      SHA256

      6f163577db53abda64356b371f1c2c018eb482aab71fd2f2290f3e40faa0bf40

      SHA512

      99d4a05d544a2554ba87283c2db654fc1047508b1447c8c565986896de31fa3696bb5f4e6d4a9d602052824b8be7362a156e911799201b96e6f295b86ab9479a

    • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF000206D7\info.txt

      Filesize

      325B

      MD5

      8866dae2c36551d109ae079b6664eb85

      SHA1

      68f759bac54b5da48eda466707ab1ff8a634d803

      SHA256

      492a16917b39719d5eefe6bf4f9a5bb926c9531f0552679b6144f46fea071f34

      SHA512

      e14f5be87453511b327d0f8a2f12fc2edcbf65448e0b84cb7d9191b61eba15fb115b536c6b47ea011e09d1b74a4cc6fd0cc4c7138a12cfa0b6e8866c65644cee

    • C:\Users\Admin\AppData\Local\Temp\Zip.exe

      Filesize

      31KB

      MD5

      af07e88ec22cc90cebfda29517f101b9

      SHA1

      a9e6f4ae24abf76966d7db03af9c802e83760143

      SHA256

      1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

      SHA512

      b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

    • C:\Users\Admin\AppData\Local\Temp\Zip.exe

      Filesize

      31KB

      MD5

      af07e88ec22cc90cebfda29517f101b9

      SHA1

      a9e6f4ae24abf76966d7db03af9c802e83760143

      SHA256

      1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

      SHA512

      b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

    • \Users\Admin\AppData\Local\Temp\Zip.exe

      Filesize

      31KB

      MD5

      af07e88ec22cc90cebfda29517f101b9

      SHA1

      a9e6f4ae24abf76966d7db03af9c802e83760143

      SHA256

      1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

      SHA512

      b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

    • memory/1148-58-0x0000000000240000-0x000000000024C000-memory.dmp

      Filesize

      48KB

    • memory/1148-54-0x0000000000970000-0x0000000000A52000-memory.dmp

      Filesize

      904KB

    • memory/1148-60-0x0000000005250000-0x00000000052DE000-memory.dmp

      Filesize

      568KB

    • memory/1148-59-0x0000000005080000-0x0000000005142000-memory.dmp

      Filesize

      776KB

    • memory/1148-57-0x00000000048E0000-0x0000000004920000-memory.dmp

      Filesize

      256KB

    • memory/1148-56-0x00000000001E0000-0x00000000001EC000-memory.dmp

      Filesize

      48KB

    • memory/1148-55-0x00000000048E0000-0x0000000004920000-memory.dmp

      Filesize

      256KB

    • memory/1232-95-0x000000001B0F0000-0x000000001B170000-memory.dmp

      Filesize

      512KB

    • memory/1232-88-0x000000001B0F0000-0x000000001B170000-memory.dmp

      Filesize

      512KB

    • memory/1232-87-0x00000000001D0000-0x00000000001E0000-memory.dmp

      Filesize

      64KB

    • memory/1360-61-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/1360-81-0x0000000004E20000-0x0000000004E60000-memory.dmp

      Filesize

      256KB

    • memory/1360-73-0x0000000004E20000-0x0000000004E60000-memory.dmp

      Filesize

      256KB

    • memory/1360-72-0x0000000004E20000-0x0000000004E60000-memory.dmp

      Filesize

      256KB

    • memory/1360-69-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/1360-71-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/1360-67-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/1360-89-0x0000000004E20000-0x0000000004E60000-memory.dmp

      Filesize

      256KB

    • memory/1360-66-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1360-65-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/1360-64-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/1360-63-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/1360-62-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB