Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2023 12:27

General

  • Target

    toba22bbc.exe

  • Size

    977KB

  • MD5

    13348cb1966e434e5cb63b82e42291b7

  • SHA1

    0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

  • SHA256

    edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

  • SHA512

    0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

  • SSDEEP

    24576:8FUrdbfahvepYoeyAmzhocZn+M+WGDBGkV:8Yb1bPhoCnD+WGIkV

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    premium251.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Y&aIvOB1dbH9##

Signatures

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 12 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\toba22bbc.exe
    "C:\Users\Admin\AppData\Local\Temp\toba22bbc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\toba22bbc.exe
      "C:\Users\Admin\AppData\Local\Temp\toba22bbc.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:3904
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"
      2⤵
        PID:3988
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\toba22bbc.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
        2⤵
          PID:4740
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3948
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
            3⤵
            • Creates scheduled task(s)
            PID:3964
      • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
          2⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1864
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"
          2⤵
            PID:3792
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4056
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
              3⤵
              • Creates scheduled task(s)
              PID:1700
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c copy "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
            2⤵
              PID:3496
          • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
            C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
              "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
              2⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook profiles
              • Checks processor information in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:2184
            • C:\Windows\SysWOW64\cmd.exe
              "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"
              2⤵
                PID:3600
              • C:\Windows\SysWOW64\cmd.exe
                "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:408
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
                  3⤵
                  • Creates scheduled task(s)
                  PID:652
              • C:\Windows\SysWOW64\cmd.exe
                "cmd" /c copy "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
                2⤵
                  PID:4692
              • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
                C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1944
                • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe
                  "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
                  2⤵
                  • Executes dropped EXE
                  • Accesses Microsoft Outlook profiles
                  • Checks processor information in registry
                  • Suspicious use of AdjustPrivilegeToken
                  • outlook_office_path
                  • outlook_win_path
                  PID:784
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"
                  2⤵
                    PID:3076
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
                    2⤵
                      PID:4644
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f
                        3⤵
                        • Creates scheduled task(s)
                        PID:3796
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd" /c copy "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"
                      2⤵
                        PID:2240

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

                      Filesize

                      609B

                      MD5

                      f78129c2d7c98a4397fa4931b11feef4

                      SHA1

                      ea26f38d12515741651ff161ea8393d5fa41a5bd

                      SHA256

                      29830390784d06271342237443b6224bb98be0539e34b64e7344c78d7cdd93d9

                      SHA512

                      cbca1d486c2bd7655752930b9020ccf3f8ae67a67dcb2cca51c31763a51fea8fb951d617c31a3746680303a8c6d45361c120f15ef06c30b417202949728b5b35

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\toba22bbc.exe.log

                      Filesize

                      609B

                      MD5

                      f78129c2d7c98a4397fa4931b11feef4

                      SHA1

                      ea26f38d12515741651ff161ea8393d5fa41a5bd

                      SHA256

                      29830390784d06271342237443b6224bb98be0539e34b64e7344c78d7cdd93d9

                      SHA512

                      cbca1d486c2bd7655752930b9020ccf3f8ae67a67dcb2cca51c31763a51fea8fb951d617c31a3746680303a8c6d45361c120f15ef06c30b417202949728b5b35

                    • C:\Users\Admin\AppData\Local\Temp\4mjjryiq.fju\userinfo.txt

                      Filesize

                      182B

                      MD5

                      7fa48e809e4edbadd05e895f57956f4d

                      SHA1

                      e82309c25c60669f10305fe80c6cc3de24d8be17

                      SHA256

                      806a2cc7e8a4bb9d293f732907b89149529d85e832de0ef5e76c37c222adab49

                      SHA512

                      10c05a991eb0da721127269ceaef69e80e07af92eae5409b0887daf3a111e13fbbbd35a557768691a7adbb3c3330f27bb88a6337d4a62e8845f69172121d6bcc

                    • C:\Users\Admin\AppData\Local\Temp\rznzouz1.dwz\Cookies\Chrome-Default.json

                      Filesize

                      2B

                      MD5

                      d751713988987e9331980363e24189ce

                      SHA1

                      97d170e1550eee4afc0af065b78cda302a97674c

                      SHA256

                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                      SHA512

                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                    • C:\Users\Admin\AppData\Local\Temp\tmp9966.tmp

                      Filesize

                      46KB

                      MD5

                      02d2c46697e3714e49f46b680b9a6b83

                      SHA1

                      84f98b56d49f01e9b6b76a4e21accf64fd319140

                      SHA256

                      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                      SHA512

                      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                    • C:\Users\Admin\AppData\Local\Temp\tmpA4C0.tmp.tmpdb

                      Filesize

                      20KB

                      MD5

                      c9ff7748d8fcef4cf84a5501e996a641

                      SHA1

                      02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                      SHA256

                      4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                      SHA512

                      d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                    • C:\Users\Admin\AppData\Local\Temp\tmpA4F2.tmp.tmpdb

                      Filesize

                      96KB

                      MD5

                      d367ddfda80fdcf578726bc3b0bc3e3c

                      SHA1

                      23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                      SHA256

                      0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                      SHA512

                      40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                    • C:\Users\Admin\AppData\Local\Temp\tmpBA80.tmp.tmpdb

                      Filesize

                      288KB

                      MD5

                      e8a9050a3a1af10a3b4ad0cb2f8bb4cc

                      SHA1

                      323054d0f1c23c9ae2c2210ae35430088c5e45dc

                      SHA256

                      0dd3a057cb8af599f7abf4e9fdf4782211505d0185cfe8e81ed35545c8b08c5f

                      SHA512

                      101c4455c56a8dcf288048b5d62b08f8c5298cb23f73fc5b1cc02f8aae40157ab94cfe843c38716e55d84966a00a6dc6a64581b5723814ddffb667514361e6a7

                    • C:\Users\Admin\AppData\Local\Temp\vabzz2tx.spt\SensitiveFiles\Are.docx

                      Filesize

                      11KB

                      MD5

                      a33e5b189842c5867f46566bdbf7a095

                      SHA1

                      e1c06359f6a76da90d19e8fd95e79c832edb3196

                      SHA256

                      5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                      SHA512

                      f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                    • C:\Users\Admin\AppData\Local\Temp\vabzz2tx.spt\SensitiveFiles\Files.docx

                      Filesize

                      11KB

                      MD5

                      4a8fbd593a733fc669169d614021185b

                      SHA1

                      166e66575715d4c52bcb471c09bdbc5a9bb2f615

                      SHA256

                      714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42

                      SHA512

                      6b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b

                    • C:\Users\Admin\AppData\Local\Temp\vabzz2tx.spt\SensitiveFiles\Opened.docx

                      Filesize

                      11KB

                      MD5

                      bfbc1a403197ac8cfc95638c2da2cf0e

                      SHA1

                      634658f4dd9747e87fa540f5ba47e218acfc8af2

                      SHA256

                      272ed278e82c84cf4f80f48ec7989e1fc35f2055d6d05b63c8a31880846597a6

                      SHA512

                      b8938526fcbf7152805aec130ca553e3ec949cb825430a5d0a25c90ec5eb0863857010484a4b31fdc4bb65a4c92ad7127c812b93114be4569a677f60debe43b1

                    • C:\Users\Admin\AppData\Local\Temp\vabzz2tx.spt\SensitiveFiles\Recently.docx

                      Filesize

                      11KB

                      MD5

                      3b068f508d40eb8258ff0b0592ca1f9c

                      SHA1

                      59ac025c3256e9c6c86165082974fe791ff9833a

                      SHA256

                      07db44a8d6c3a512b15f1cb7262a2d7e4b63ced2130bc9228515431699191cc7

                      SHA512

                      e29624bc8fecb0e2a9d917642375bd97b42502e5f23812195a61a4920cae5b6ed540e74dfcf8432dcceb7de906ad0501cdd68056f9b0ec86a6bb0c1e336bfe32

                    • C:\Users\Admin\AppData\Local\Temp\vabzz2tx.spt\SensitiveFiles\StepSuspend.docx

                      Filesize

                      681KB

                      MD5

                      98a9fa0583495aeb03efffc77ad65963

                      SHA1

                      00e4a0ce3b00d3001e81fe55414e2c0d05058bb1

                      SHA256

                      05dab77ce55417a2bad76a0bc77c7fc4a1e4c32232367ed5b402a9038841d5a9

                      SHA512

                      7aa4bf1e526b34c15c56f8ab119cb2bd96a7f6058056b1c1a3bf13deed39a643c2d4e5c2dbceef21b8036dbbf971f5d960314105a26f8223758590f5479ba402

                    • C:\Users\Admin\AppData\Local\Temp\vabzz2tx.spt\SensitiveFiles\These.docx

                      Filesize

                      11KB

                      MD5

                      87cbab2a743fb7e0625cc332c9aac537

                      SHA1

                      50f858caa7f4ac3a93cf141a5d15b4edeb447ee7

                      SHA256

                      57e3b0d22fa619da90237d8bcf8f922b142c9f6abf47efc5a1f5b208c4d3f023

                      SHA512

                      6b678f0dd0030806effe6825fd52a6a30b951e0c3dcf91dfd7a713d387aa8b39ec24368e9623c463360acba5e929e268f75ce996526c5d4485894b8ac6b2e0fa

                    • C:\Users\Admin\AppData\Local\Temp\vabzz2tx.spt\SensitiveFiles\UseReceive.docx

                      Filesize

                      829KB

                      MD5

                      cc30e29ea1f95a0d84794a57f8745df6

                      SHA1

                      2b1b64434701229bc368131862ea7d1b5311ce05

                      SHA256

                      6c9f41ecaa8247b9f0bab3d1307df7e02d7abee7768e658bde794c55256fb7c9

                      SHA512

                      1176e33ea9380b3e7f5c48defdb48216fc4fc1746146a509369aaa550b9905a74d4b2597fe9347a70312f92c5e626674b9c79bca4e734e16997aaf091c3e6464

                    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

                      Filesize

                      977KB

                      MD5

                      13348cb1966e434e5cb63b82e42291b7

                      SHA1

                      0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

                      SHA256

                      edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

                      SHA512

                      0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

                    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

                      Filesize

                      977KB

                      MD5

                      13348cb1966e434e5cb63b82e42291b7

                      SHA1

                      0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

                      SHA256

                      edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

                      SHA512

                      0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

                    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

                      Filesize

                      977KB

                      MD5

                      13348cb1966e434e5cb63b82e42291b7

                      SHA1

                      0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

                      SHA256

                      edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

                      SHA512

                      0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

                    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

                      Filesize

                      977KB

                      MD5

                      13348cb1966e434e5cb63b82e42291b7

                      SHA1

                      0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

                      SHA256

                      edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

                      SHA512

                      0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

                    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

                      Filesize

                      977KB

                      MD5

                      13348cb1966e434e5cb63b82e42291b7

                      SHA1

                      0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

                      SHA256

                      edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

                      SHA512

                      0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

                    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

                      Filesize

                      977KB

                      MD5

                      13348cb1966e434e5cb63b82e42291b7

                      SHA1

                      0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

                      SHA256

                      edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

                      SHA512

                      0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

                    • C:\Users\Admin\AppData\Roaming\svchost\svchost.exe

                      Filesize

                      977KB

                      MD5

                      13348cb1966e434e5cb63b82e42291b7

                      SHA1

                      0c8c616bbdf2b7996358142af6a6ba886fc2b2a9

                      SHA256

                      edcf7182460deb84c07d79968ebb518cc9c8611148a4eb0e1e37b78ff175f275

                      SHA512

                      0c9f23bd9e17dad82ae5a634ac92f252e522f76de693e82210449bcb08e6038880a8a4a028632cd74764d2778f141d0cfd39754ee06348007e1b90968654643b

                    • memory/3904-184-0x0000000008E70000-0x0000000008E82000-memory.dmp

                      Filesize

                      72KB

                    • memory/3904-139-0x0000000004F50000-0x0000000004F60000-memory.dmp

                      Filesize

                      64KB

                    • memory/3904-183-0x0000000008E40000-0x0000000008E4A000-memory.dmp

                      Filesize

                      40KB

                    • memory/3904-146-0x0000000008A30000-0x0000000008A52000-memory.dmp

                      Filesize

                      136KB

                    • memory/3904-142-0x0000000007450000-0x00000000074B6000-memory.dmp

                      Filesize

                      408KB

                    • memory/3904-137-0x0000000000400000-0x00000000004D2000-memory.dmp

                      Filesize

                      840KB

                    • memory/4696-136-0x00000000054A0000-0x00000000054B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4696-133-0x0000000000950000-0x0000000000A4A000-memory.dmp

                      Filesize

                      1000KB

                    • memory/4696-135-0x0000000005400000-0x0000000005492000-memory.dmp

                      Filesize

                      584KB

                    • memory/4696-134-0x0000000005A60000-0x0000000006004000-memory.dmp

                      Filesize

                      5.6MB