Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2023 13:44
Static task
static1
Behavioral task
behavioral1
Sample
4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe
Resource
win10v2004-20230221-en
General
-
Target
4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe
-
Size
646KB
-
MD5
311102ca55b09ee930cfceca5e4c06da
-
SHA1
8fbe0182c4ae39acb97a23f16b5d758b4183ad4b
-
SHA256
4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d
-
SHA512
0e812ff97fb68c2d635a681d12d21b997e81bb9a442bf1c375d7a459c1785bb355cb62227bb15672cd7146437d8f5274da8e348170c5570d247def339b8b73ee
-
SSDEEP
12288:6GvZepMqJ07C6YHyrn9baFbUBXrVAlLSjujRJK/sJ2:6IgpM+F6YHyDYFYUNSVA2
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
eJkG%KP9
Signatures
-
404 Keylogger
Information stealer and keylogger first seen in 2019.
-
404 Keylogger Main Executable 6 IoCs
resource yara_rule behavioral1/memory/1788-58-0x0000000000400000-0x0000000000450000-memory.dmp family_404keylogger behavioral1/memory/1788-59-0x0000000000310000-0x0000000000332000-memory.dmp family_404keylogger behavioral1/memory/1788-60-0x0000000000310000-0x0000000000332000-memory.dmp family_404keylogger behavioral1/memory/1788-71-0x0000000000400000-0x0000000000450000-memory.dmp family_404keylogger behavioral1/memory/1788-72-0x0000000004690000-0x00000000046D0000-memory.dmp family_404keylogger behavioral1/memory/1788-89-0x0000000004690000-0x00000000046D0000-memory.dmp family_404keylogger -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1788-54-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1788-57-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1788-58-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 1788 2036 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1924 1788 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 1788 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2036 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1788 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1788 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1788 2036 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 28 PID 2036 wrote to memory of 1788 2036 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 28 PID 2036 wrote to memory of 1788 2036 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 28 PID 2036 wrote to memory of 1788 2036 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 28 PID 1788 wrote to memory of 1924 1788 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 30 PID 1788 wrote to memory of 1924 1788 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 30 PID 1788 wrote to memory of 1924 1788 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 30 PID 1788 wrote to memory of 1924 1788 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe"C:\Users\Admin\AppData\Local\Temp\4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe"C:\Users\Admin\AppData\Local\Temp\4d10520e2b80ca42e98590435c36c5409a458d9a5bd0ad35b0f444d2ceb2626d.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 18683⤵
- Program crash
PID:1924
-
-