Analysis
-
max time kernel
43s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2023, 08:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04254099.exe
Resource
win7-20230220-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
04254099.exe
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
04254099.exe
-
Size
510KB
-
MD5
e5e21de748302d8284cf59bd050d4945
-
SHA1
56ca6ab52b877a1752f23cbb47b342e7b6882653
-
SHA256
73ee737e5bb4e53ce37177cf1ee0155ba04475523ddc7f8bd35754d5e3d162aa
-
SHA512
aaae0f5c521837814578ec1509e7bf9f597bcd6b693de9a3731f22ab5e5e16f35d6a458c4c2ee79dcd5708ae00e192a1f22e3cbe6d70d9c0544eb729a1374269
-
SSDEEP
6144:2PNP5bKdBTYQVWtRvckecX5vZMBNKRqOSnyDOk8liUnHrfkYF2RguzxQQ3nKala:QNQdB3VCbecX706ok8vfnGhxn3nKQ
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1160 created 1236 1160 04254099.exe 15 -
Deletes itself 1 IoCs
pid Process 1212 certreq.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1160 04254099.exe 1160 04254099.exe 1160 04254099.exe 1160 04254099.exe 1212 certreq.exe 1212 certreq.exe 1212 certreq.exe 1212 certreq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1212 1160 04254099.exe 28 PID 1160 wrote to memory of 1212 1160 04254099.exe 28 PID 1160 wrote to memory of 1212 1160 04254099.exe 28 PID 1160 wrote to memory of 1212 1160 04254099.exe 28 PID 1160 wrote to memory of 1212 1160 04254099.exe 28 PID 1160 wrote to memory of 1212 1160 04254099.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\04254099.exe"C:\Users\Admin\AppData\Local\Temp\04254099.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:1212
-