Resubmissions

27-11-2024 09:58

241127-lz1djsymhw 10

09-06-2023 14:54

230609-r94fvadc51 10

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2023 14:54

General

  • Target

    60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef.exe

  • Size

    444KB

  • MD5

    bee5fe7fa8e65983ff04a9e680a4e8c2

  • SHA1

    5f42a9bdc2f4cce46cd5b61509bedd8f597d202d

  • SHA256

    60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef

  • SHA512

    88b0077ba5e31984761db7a9490e0121d3e6458feaba992339d4011cfffd375ba7c3ca88569e12554c131ac61a2facf29c644d348ecf7c99e10720d4a92bce9b

  • SSDEEP

    6144:IjKvnAzRPqkroWBcrTIhB1uA2dOJhhgWbMbitWGFNuldsfiy3NiGA:Ijzgk0GoIuA6ahE+F0/y36

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3160
      • C:\Users\Admin\AppData\Local\Temp\60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef.exe
        "C:\Users\Admin\AppData\Local\Temp\60f7a8154bf2f9995b2e10836460d267251debdcedcf2bb2cbee918af1221eef.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5084
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:4792

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4792-150-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-152-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-147-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-136-0x0000019970FE0000-0x0000019970FE3000-memory.dmp

      Filesize

      12KB

    • memory/4792-146-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-155-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-144-0x0000019970FE0000-0x0000019970FE3000-memory.dmp

      Filesize

      12KB

    • memory/4792-148-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-154-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-153-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/4792-145-0x0000019971240000-0x0000019971247000-memory.dmp

      Filesize

      28KB

    • memory/4792-149-0x00007FF4C8220000-0x00007FF4C834D000-memory.dmp

      Filesize

      1.2MB

    • memory/5084-143-0x00000000031E0000-0x0000000003216000-memory.dmp

      Filesize

      216KB

    • memory/5084-133-0x00000000022F0000-0x00000000022F7000-memory.dmp

      Filesize

      28KB

    • memory/5084-137-0x00000000031E0000-0x0000000003216000-memory.dmp

      Filesize

      216KB

    • memory/5084-135-0x0000000002300000-0x0000000002700000-memory.dmp

      Filesize

      4.0MB

    • memory/5084-134-0x0000000002300000-0x0000000002700000-memory.dmp

      Filesize

      4.0MB