Analysis
-
max time kernel
39s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 06:22
Static task
static1
Behavioral task
behavioral1
Sample
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe
Resource
win10v2004-20230220-en
General
-
Target
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe
-
Size
1.2MB
-
MD5
e488e1a45eb1b7ea061c6a3d9f0729f7
-
SHA1
523c99b72980e3a82a20378fe22949b2c2bf43a1
-
SHA256
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2
-
SHA512
a8398e7323c247c5f5bd4239e44f2037aa03619828b8927c30277651128c392950bfd9a3fe59e946f28b3937b473d0ba86169b1baa52f59ed30f53ac7c8ccd53
-
SSDEEP
12288:p0yiHh/Iwu6+pM3BHB0kTp05xm0Nj/RfycXzN/7RPyIoDvS/efj1WI0CVq:pGhNu65fI5/NjJfRpNPz1AR0C
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe -
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/744-62-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral1/memory/744-63-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral1/memory/744-65-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral1/memory/744-69-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral1/memory/744-67-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 5 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/744-62-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral1/memory/744-63-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral1/memory/744-65-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral1/memory/744-69-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral1/memory/744-67-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView -
Nirsoft 5 IoCs
Processes:
resource yara_rule behavioral1/memory/744-62-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral1/memory/744-63-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral1/memory/744-65-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral1/memory/744-69-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral1/memory/744-67-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 whatismyipaddress.com 6 whatismyipaddress.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exedescription pid process target process PID 912 set thread context of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exedescription pid process Token: SeDebugPrivilege 744 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exedescription pid process target process PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe PID 912 wrote to memory of 744 912 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe 4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe"C:\Users\Admin\AppData\Local\Temp\4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\4e08d3d7a3ecb630ccf016f97a79aab7f44b255484737d574599c25acf0952b2.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:744
-