Analysis

  • max time kernel
    58s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2023, 12:29

General

  • Target

    Covid 19 Immunity Tips.exe

  • Size

    388KB

  • MD5

    76fffeef410bd6b633c09c0f6529891d

  • SHA1

    774a51b0b07a7c606672a669fca5939b25b53e66

  • SHA256

    e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a

  • SHA512

    1fca78852d9ba98ae4ee2ade1694038e6da6fa2d1e29a82e859f6963d6d86b4247da70c7f9780e0ea36f7f7dff178de9c55a450e528c30a073ebbff94423a3d4

  • SSDEEP

    12288:HTYFk+FX3k1xJo2X/S2v4WAqhafvUT1Pk9J7y:Hck+RMxJX/S2vOgaf6c

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Covid 19 Immunity Tips.exe
    "C:\Users\Admin\AppData\Local\Temp\Covid 19 Immunity Tips.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:1524
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5fc9758,0x7fef5fc9768,0x7fef5fc9778
      2⤵
        PID:684
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:2
        2⤵
          PID:1076
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:8
          2⤵
            PID:860
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:8
            2⤵
              PID:656
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:1
              2⤵
                PID:948
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2364 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:1
                2⤵
                  PID:1572
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1440 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:2
                  2⤵
                    PID:2148
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1396 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:1
                    2⤵
                      PID:2232
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3900 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:8
                      2⤵
                        PID:2244
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4016 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:8
                        2⤵
                          PID:2256
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3920 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:1
                          2⤵
                            PID:2416
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4488 --field-trial-handle=1404,i,17309796395424447476,12283965154002471727,131072 /prefetch:1
                            2⤵
                              PID:2644
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:1696
                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                              "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterShow.M2V"
                              1⤵
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:2176

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\3fdb966f-03a6-44bb-8d07-6f862ee0573b.tmp

                              Filesize

                              154KB

                              MD5

                              dbcfb6c3b0a89fe22773af822f17bbd6

                              SHA1

                              b1a87b53ff04ea93db5a42986dddfbc4f939ac25

                              SHA256

                              0136ba14a04e814f4f91a7f4bf06a04fc84aabdddae86663e438a12be6ea5194

                              SHA512

                              f20425e01a54ed2ca6fbd46f49e99aafb0d8d27f1ec906d1c7215c4f6df19acd5f20e3faa679837a92dd5f337dd531cc3702f79c1bfd4fbddd86b9355318559b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              4KB

                              MD5

                              7e181acc05c92e657ab0326917bb2207

                              SHA1

                              616e2c13344a5dc3474217424ecaac905e79128d

                              SHA256

                              54df556659d062f6faa33b6cf4bb89811f9b572dec8d83d76be40591bfb022c6

                              SHA512

                              f4c43acca8c1875cd92d4596b0ab216dc0f5613783fe2cdb288dc294fe24b4be4a833519aa84372a2c2981cfc0da98702472598bb999fdd85ad22cb123f2a661

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              154KB

                              MD5

                              0898e4678bcd92dfb08300068a1a76eb

                              SHA1

                              06e236183727e35bd2230b95f20ff4ca18c607f3

                              SHA256

                              2c04c61ea49ec309eb0fa5f65bbe49732a768aa64842030a33074f0913c99a6f

                              SHA512

                              268e8448837dd35d0841d9da1ec3275cf0c237c49e530cd956a317226f08902dab59983723505ebd9bcdc267bc2ad40bc9098d4722ce2db497b428f1cbe2f070

                            • memory/1524-97-0x00000000001C0000-0x0000000000200000-memory.dmp

                              Filesize

                              256KB

                            • memory/1524-54-0x00000000001C0000-0x0000000000200000-memory.dmp

                              Filesize

                              256KB

                            • memory/1524-106-0x00000000001C0000-0x0000000000200000-memory.dmp

                              Filesize

                              256KB

                            • memory/1524-55-0x00000000001C0000-0x0000000000200000-memory.dmp

                              Filesize

                              256KB

                            • memory/2176-262-0x000000013F770000-0x000000013F868000-memory.dmp

                              Filesize

                              992KB

                            • memory/2176-263-0x000007FEF68C0000-0x000007FEF68F4000-memory.dmp

                              Filesize

                              208KB

                            • memory/2176-264-0x000007FEF5AD0000-0x000007FEF5D84000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2176-265-0x000007FEF4600000-0x000007FEF56AB000-memory.dmp

                              Filesize

                              16.7MB

                            • memory/2176-266-0x000007FEF39F0000-0x000007FEF3B02000-memory.dmp

                              Filesize

                              1.1MB