Resubmissions

27-11-2024 09:58

241127-lz1djsymhw 10

09-06-2023 14:54

230609-r94fvadc51 10

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-06-2023 14:54

General

  • Target

    60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef.exe

  • Size

    444KB

  • MD5

    bee5fe7fa8e65983ff04a9e680a4e8c2

  • SHA1

    5f42a9bdc2f4cce46cd5b61509bedd8f597d202d

  • SHA256

    60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef

  • SHA512

    88b0077ba5e31984761db7a9490e0121d3e6458feaba992339d4011cfffd375ba7c3ca88569e12554c131ac61a2facf29c644d348ecf7c99e10720d4a92bce9b

  • SSDEEP

    6144:IjKvnAzRPqkroWBcrTIhB1uA2dOJhhgWbMbitWGFNuldsfiy3NiGA:Ijzgk0GoIuA6ahE+F0/y36

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef.exe
        "C:\Users\Admin\AppData\Local\Temp\60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1308
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Deletes itself
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:1508

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1308-64-0x00000000003C0000-0x00000000003F6000-memory.dmp

      Filesize

      216KB

    • memory/1308-55-0x0000000001D40000-0x0000000002140000-memory.dmp

      Filesize

      4.0MB

    • memory/1308-56-0x0000000001D40000-0x0000000002140000-memory.dmp

      Filesize

      4.0MB

    • memory/1308-54-0x0000000000230000-0x0000000000237000-memory.dmp

      Filesize

      28KB

    • memory/1308-58-0x00000000003C0000-0x00000000003F6000-memory.dmp

      Filesize

      216KB

    • memory/1508-67-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-65-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB

    • memory/1508-66-0x00000000001A0000-0x00000000001A7000-memory.dmp

      Filesize

      28KB

    • memory/1508-57-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB

    • memory/1508-68-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-69-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-70-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-71-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-73-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-74-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-75-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1508-76-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB