Analysis
-
max time kernel
63s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 12:04
Static task
static1
Behavioral task
behavioral1
Sample
1232.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1232.exe
Resource
win10v2004-20230621-en
General
-
Target
1232.exe
-
Size
827KB
-
MD5
a1ce7b26712e1db177d86fa87d09c354
-
SHA1
23d567e5ee4d4bf882f5d4ebe54643eecd921ef4
-
SHA256
b6b0ac3d7e4ef3a97fb470b38e53f3d8114b736b60408d9828cd5f81e2d7cf0e
-
SHA512
e5d5c4770131274c28dab0adbac3ed84395aca30a8c15f7004cd4d28ae503c507dacb432dcce65b2f004711837b3cd7a26766b028957aa3a8bc2d99f9dd849d4
-
SSDEEP
12288:IKY7z5GoJiGaq5auxKSjipNvJDK2WSqcIVr4vo1euUTyH2BQMyEp0mpefJ3Lww:G5GoR5amjipNvFK2LXG3VrEuqqJ8w
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5948365373:AAHGoShKq2YoPLHuMrakRbVNthbMABFYHUc/sendMessage?chat_id=-1001620069625
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1232.exe Key opened \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1232.exe Key opened \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1232.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 1860 1148 1232.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1264 1860 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1148 1232.exe 1860 1232.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1148 1232.exe Token: SeDebugPrivilege 1860 1232.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1148 wrote to memory of 584 1148 1232.exe 28 PID 1148 wrote to memory of 584 1148 1232.exe 28 PID 1148 wrote to memory of 584 1148 1232.exe 28 PID 1148 wrote to memory of 584 1148 1232.exe 28 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1148 wrote to memory of 1860 1148 1232.exe 29 PID 1860 wrote to memory of 1264 1860 1232.exe 30 PID 1860 wrote to memory of 1264 1860 1232.exe 30 PID 1860 wrote to memory of 1264 1860 1232.exe 30 PID 1860 wrote to memory of 1264 1860 1232.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1232.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1232.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1232.exe"C:\Users\Admin\AppData\Local\Temp\1232.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\1232.exe"C:\Users\Admin\AppData\Local\Temp\1232.exe"2⤵PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\1232.exe"C:\Users\Admin\AppData\Local\Temp\1232.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 23923⤵
- Program crash
PID:1264
-
-