Analysis
-
max time kernel
58s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2023, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
Covid 19 Immunity Tips.exe
Resource
win7-20230220-en
General
-
Target
Covid 19 Immunity Tips.exe
-
Size
388KB
-
MD5
76fffeef410bd6b633c09c0f6529891d
-
SHA1
774a51b0b07a7c606672a669fca5939b25b53e66
-
SHA256
e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a
-
SHA512
1fca78852d9ba98ae4ee2ade1694038e6da6fa2d1e29a82e859f6963d6d86b4247da70c7f9780e0ea36f7f7dff178de9c55a450e528c30a073ebbff94423a3d4
-
SSDEEP
12288:HTYFk+FX3k1xJo2X/S2v4WAqhafvUT1Pk9J7y:Hck+RMxJX/S2vOgaf6c
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Covid 19 Immunity Tips.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Covid 19 Immunity Tips.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Covid 19 Immunity Tips.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2176 vlc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1524 Covid 19 Immunity Tips.exe 1524 Covid 19 Immunity Tips.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 vlc.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1524 Covid 19 Immunity Tips.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe 2176 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2176 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 684 1460 chrome.exe 29 PID 1460 wrote to memory of 684 1460 chrome.exe 29 PID 1460 wrote to memory of 684 1460 chrome.exe 29 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 1076 1460 chrome.exe 30 PID 1460 wrote to memory of 860 1460 chrome.exe 31 PID 1460 wrote to memory of 860 1460 chrome.exe 31 PID 1460 wrote to memory of 860 1460 chrome.exe 31 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 PID 1460 wrote to memory of 656 1460 chrome.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Covid 19 Immunity Tips.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Covid 19 Immunity Tips.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Covid 19 Immunity Tips.exe"C:\Users\Admin\AppData\Local\Temp\Covid 19 Immunity Tips.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1524
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5fc9758,0x7fef5fc9768,0x7fef5fc97782⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:22⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:82⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:12⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2364 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1440 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:22⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1396 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3900 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4016 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3920 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4488 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1696
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterShow.M2V"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5dbcfb6c3b0a89fe22773af822f17bbd6
SHA1b1a87b53ff04ea93db5a42986dddfbc4f939ac25
SHA2560136ba14a04e814f4f91a7f4bf06a04fc84aabdddae86663e438a12be6ea5194
SHA512f20425e01a54ed2ca6fbd46f49e99aafb0d8d27f1ec906d1c7215c4f6df19acd5f20e3faa679837a92dd5f337dd531cc3702f79c1bfd4fbddd86b9355318559b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD57e181acc05c92e657ab0326917bb2207
SHA1616e2c13344a5dc3474217424ecaac905e79128d
SHA25654df556659d062f6faa33b6cf4bb89811f9b572dec8d83d76be40591bfb022c6
SHA512f4c43acca8c1875cd92d4596b0ab216dc0f5613783fe2cdb288dc294fe24b4be4a833519aa84372a2c2981cfc0da98702472598bb999fdd85ad22cb123f2a661
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
154KB
MD50898e4678bcd92dfb08300068a1a76eb
SHA106e236183727e35bd2230b95f20ff4ca18c607f3
SHA2562c04c61ea49ec309eb0fa5f65bbe49732a768aa64842030a33074f0913c99a6f
SHA512268e8448837dd35d0841d9da1ec3275cf0c237c49e530cd956a317226f08902dab59983723505ebd9bcdc267bc2ad40bc9098d4722ce2db497b428f1cbe2f070