Analysis
-
max time kernel
90s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-04-2023 06:57
Static task
static1
Behavioral task
behavioral1
Sample
FedExInvoice013.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FedExInvoice013.exe
Resource
win10v2004-20230220-en
General
-
Target
FedExInvoice013.exe
-
Size
877KB
-
MD5
c2744c4bab87079337e5040cec0c202c
-
SHA1
f9a492ebcd8647eb373e889329a12bc69beca10d
-
SHA256
0663257fdd4fc2ee70895f2d46ed462472c2eb8734bd191ab37df92555276bc3
-
SHA512
b4500903b5d30bdd558f241ac31d2405a966ef3b6444674b3b35d01741402ce08a55deeed0bbd85bbe673491a4d4ce4e7b30608e19f008b309ebc91b448ceabf
-
SSDEEP
12288:OqxiRq8Wzhy7/G5F4MkyzlvMjSp2O28Bu7O1mwlF6jiFOhG4q3N4X5Krg:3iRKhy7/G5GMxt67/m6uJMr
Malware Config
Signatures
-
PredatorStealer
Predator is a modular stealer written in C#.
-
Executes dropped EXE 1 IoCs
pid Process 1232 Zip.exe -
Loads dropped DLL 1 IoCs
pid Process 1360 FedExInvoice013.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\update_231308.exe / start" FedExInvoice013.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 1360 1148 FedExInvoice013.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1148 FedExInvoice013.exe 1360 FedExInvoice013.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1360 FedExInvoice013.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1148 FedExInvoice013.exe Token: SeDebugPrivilege 1360 FedExInvoice013.exe Token: SeDebugPrivilege 1232 Zip.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1348 1148 FedExInvoice013.exe 28 PID 1148 wrote to memory of 1348 1148 FedExInvoice013.exe 28 PID 1148 wrote to memory of 1348 1148 FedExInvoice013.exe 28 PID 1148 wrote to memory of 1348 1148 FedExInvoice013.exe 28 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1148 wrote to memory of 1360 1148 FedExInvoice013.exe 29 PID 1360 wrote to memory of 1232 1360 FedExInvoice013.exe 31 PID 1360 wrote to memory of 1232 1360 FedExInvoice013.exe 31 PID 1360 wrote to memory of 1232 1360 FedExInvoice013.exe 31 PID 1360 wrote to memory of 1232 1360 FedExInvoice013.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"2⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"2⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Zip.exe"C:\Users\Admin\AppData\Local\Temp\Zip.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5db708091ee86de3b508496bca9178f27
SHA1fa3e67e4143c48d40d66e2f1bc326c16f32c2286
SHA256f46462fa4372885611f2b03780e37360f6a5f7814f797e94416d7bcad8186546
SHA512a98558b01d47181f0ba8fb50622cb26a24aa8d233d0cd4b6e8a67e2c95be35ad05decbb6b2a95702858d7030b06135b7c71ddef57b4b18aca5f5c7f972c09931
-
Filesize
496B
MD53190d223f4a7048543dcfad5419229f7
SHA15480e0e40639115a601484323dfc31f70ee0547c
SHA25650c8a8c00a38b38500fa5a7ecdc036e43f74768c32276110a38221fa583e72e7
SHA512f85f2fd605e9a7836bbd3dadcc75fdb60b79013a88e03cb1ea9fe86fa08be27d57f1fe6688495b9dbd5e6a7e722f1d3ed16239f0879f0baeaa99c3b0f001ef81
-
Filesize
391KB
MD5979e52ac0e30546c682fabb3753b06ca
SHA1279908e9618f8880cf76e65ccc4e1af4ce685d5c
SHA2566f163577db53abda64356b371f1c2c018eb482aab71fd2f2290f3e40faa0bf40
SHA51299d4a05d544a2554ba87283c2db654fc1047508b1447c8c565986896de31fa3696bb5f4e6d4a9d602052824b8be7362a156e911799201b96e6f295b86ab9479a
-
Filesize
325B
MD58866dae2c36551d109ae079b6664eb85
SHA168f759bac54b5da48eda466707ab1ff8a634d803
SHA256492a16917b39719d5eefe6bf4f9a5bb926c9531f0552679b6144f46fea071f34
SHA512e14f5be87453511b327d0f8a2f12fc2edcbf65448e0b84cb7d9191b61eba15fb115b536c6b47ea011e09d1b74a4cc6fd0cc4c7138a12cfa0b6e8866c65644cee
-
Filesize
31KB
MD5af07e88ec22cc90cebfda29517f101b9
SHA1a9e6f4ae24abf76966d7db03af9c802e83760143
SHA2561632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2
SHA512b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc
-
Filesize
31KB
MD5af07e88ec22cc90cebfda29517f101b9
SHA1a9e6f4ae24abf76966d7db03af9c802e83760143
SHA2561632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2
SHA512b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc
-
Filesize
31KB
MD5af07e88ec22cc90cebfda29517f101b9
SHA1a9e6f4ae24abf76966d7db03af9c802e83760143
SHA2561632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2
SHA512b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc