Analysis
-
max time kernel
5s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2023 13:30
Static task
static1
Behavioral task
behavioral1
Sample
445.exe
Resource
win7-20230220-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
445.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
445.exe
-
Size
500KB
-
MD5
f0bb0d68532e191a83e9ec3d3e03a0b8
-
SHA1
c7236c51ceaf92dec1876b139a0f07c9fba5712d
-
SHA256
b63c575580d34f066ab3bcdae51289474a606497ff68cceabbc856710f99037d
-
SHA512
0f110dc94579b96e1b9e8b3d6509106a3fddeee4fda1b169962a75f369cd9481c548a55ece62a44f169c46e16a7d7185fa7a1c4ab17fb57fffec1b91852dce12
-
SSDEEP
12288:jzWhSlcaq3/5/ISXd897Gm1MHx7vjHWzx:jChSa3/5wSXi7Gm1G7vLWN
Score
10/10
Malware Config
Extracted
Family
gurcu
C2
https://api.telegram.org/bot5948365373:AAHGoShKq2YoPLHuMrakRbVNthbMABFYHUc/sendMessage?chat_id=-1001620069625
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1060 set thread context of 2020 1060 445.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2020 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 PID 1060 wrote to memory of 2020 1060 445.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\445.exe"C:\Users\Admin\AppData\Local\Temp\445.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2020
-