Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2023, 21:07

General

  • Target

    11.exe

  • Size

    1.3MB

  • MD5

    2c66dc153c947bdc4dda7118f60e4540

  • SHA1

    a6c6250a54c16cebdd8ded3a3b8f7bd6d7db0464

  • SHA256

    dd649575ad8c4888137f3325a6262d7634f97c07c9711fac49e2c73bd395202a

  • SHA512

    7b1f7a0f8cebb3a2a5f25755238457556e4a41b4ad0aa643284f8ff41b1ba6b1d22675edf980f1ba82da5a611b4d14a5c45e5f57584979f7ea1192153b545211

  • SSDEEP

    24576:ehloDX0XOf4lLZPs0AZCZWE7cRGo8sOgZQz00a3CI98Ye3BmQ/KV1PpAOvqADs6u:ehloJf6FFAZCZWE7cRGo8sOgZy00a3C3

Malware Config

Signatures

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11.exe
    "C:\Users\Admin\AppData\Local\Temp\11.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c A.exe /stext A.txt
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Users\Admin\AppData\Local\Temp\A.exe
        A.exe /stext A.txt
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1420
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c B.exe /stext B.txt
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Users\Admin\AppData\Local\Temp\B.exe
        B.exe /stext B.txt
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook accounts
        PID:1796

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A.exe

          Filesize

          224KB

          MD5

          440028436e4eb1d94fc14b09f5d6224c

          SHA1

          eaee95e001b415026db7aeac9804fb03e65d8caa

          SHA256

          3570596c4b62fee8a80b4cab0ee2ff6c33342d2ceb1b3d9d7d06fa352655d027

          SHA512

          516e7be456337236d2f6b550a5ec8e41590e647a3cfd6894f7dcfe714dd601ba787f88cde55f3ca5fe70d20f3ff72f9b248a0404df582be60ac08701c42c5c8d

        • C:\Users\Admin\AppData\Local\Temp\A.exe

          Filesize

          224KB

          MD5

          440028436e4eb1d94fc14b09f5d6224c

          SHA1

          eaee95e001b415026db7aeac9804fb03e65d8caa

          SHA256

          3570596c4b62fee8a80b4cab0ee2ff6c33342d2ceb1b3d9d7d06fa352655d027

          SHA512

          516e7be456337236d2f6b550a5ec8e41590e647a3cfd6894f7dcfe714dd601ba787f88cde55f3ca5fe70d20f3ff72f9b248a0404df582be60ac08701c42c5c8d

        • C:\Users\Admin\AppData\Local\Temp\A.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\B.exe

          Filesize

          202KB

          MD5

          a394c0ae6cf5530bb91b37b8bd09c468

          SHA1

          e006c548c39f36630833163fe524887780390dfd

          SHA256

          fd057d11727f14563a5533dd8453d6e3dcbf71862483a15bf8b769a73243a201

          SHA512

          17e9c6f6b3c2b6197216fd132ed54c1d2586c359c42e12915bc256472769f00a4f413f6ac83a784945b9e296d63b6b943f72876cf495569a65ff26c6189748a4

        • C:\Users\Admin\AppData\Local\Temp\B.exe

          Filesize

          202KB

          MD5

          a394c0ae6cf5530bb91b37b8bd09c468

          SHA1

          e006c548c39f36630833163fe524887780390dfd

          SHA256

          fd057d11727f14563a5533dd8453d6e3dcbf71862483a15bf8b769a73243a201

          SHA512

          17e9c6f6b3c2b6197216fd132ed54c1d2586c359c42e12915bc256472769f00a4f413f6ac83a784945b9e296d63b6b943f72876cf495569a65ff26c6189748a4

        • \Users\Admin\AppData\Local\Temp\A.exe

          Filesize

          224KB

          MD5

          440028436e4eb1d94fc14b09f5d6224c

          SHA1

          eaee95e001b415026db7aeac9804fb03e65d8caa

          SHA256

          3570596c4b62fee8a80b4cab0ee2ff6c33342d2ceb1b3d9d7d06fa352655d027

          SHA512

          516e7be456337236d2f6b550a5ec8e41590e647a3cfd6894f7dcfe714dd601ba787f88cde55f3ca5fe70d20f3ff72f9b248a0404df582be60ac08701c42c5c8d

        • \Users\Admin\AppData\Local\Temp\A.exe

          Filesize

          224KB

          MD5

          440028436e4eb1d94fc14b09f5d6224c

          SHA1

          eaee95e001b415026db7aeac9804fb03e65d8caa

          SHA256

          3570596c4b62fee8a80b4cab0ee2ff6c33342d2ceb1b3d9d7d06fa352655d027

          SHA512

          516e7be456337236d2f6b550a5ec8e41590e647a3cfd6894f7dcfe714dd601ba787f88cde55f3ca5fe70d20f3ff72f9b248a0404df582be60ac08701c42c5c8d

        • \Users\Admin\AppData\Local\Temp\B.exe

          Filesize

          202KB

          MD5

          a394c0ae6cf5530bb91b37b8bd09c468

          SHA1

          e006c548c39f36630833163fe524887780390dfd

          SHA256

          fd057d11727f14563a5533dd8453d6e3dcbf71862483a15bf8b769a73243a201

          SHA512

          17e9c6f6b3c2b6197216fd132ed54c1d2586c359c42e12915bc256472769f00a4f413f6ac83a784945b9e296d63b6b943f72876cf495569a65ff26c6189748a4

        • memory/1420-64-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/1420-62-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/1496-61-0x0000000001F00000-0x0000000001F83000-memory.dmp

          Filesize

          524KB

        • memory/1496-60-0x0000000001F00000-0x0000000001F83000-memory.dmp

          Filesize

          524KB

        • memory/1544-65-0x00000000013D0000-0x00000000016A2000-memory.dmp

          Filesize

          2.8MB

        • memory/1544-59-0x00000000013D0000-0x00000000016A2000-memory.dmp

          Filesize

          2.8MB

        • memory/1544-72-0x00000000013D0000-0x00000000016A2000-memory.dmp

          Filesize

          2.8MB

        • memory/1544-73-0x00000000013D0000-0x00000000016A2000-memory.dmp

          Filesize

          2.8MB

        • memory/1796-71-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB