Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2023, 16:57

General

  • Target

    AlphabetFormApp.exe

  • Size

    3.1MB

  • MD5

    8e0c45dde34b22df6e4055a31f06788d

  • SHA1

    02291e6dfb01f6a542c56026a9b50ff44a2dce48

  • SHA256

    5e84524b05e2456c28a3530cb8e0d7f2b811a2d7074acbbac6950bfff97f8a13

  • SHA512

    cde0a1ce1f4843647bc106e6a0fd57c56572ef4a03bca297719acb92bf753c7971f940f93ed29459cc121ae4be2a270bedbc77501524db8215ab74b48a8d4f9c

  • SSDEEP

    98304:4vJ8ad0y5vx+q5O7gowuF+TCpZEeg1GbWumM:zKH5vx+qGPcCpZEXSWn

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    crglkybqrigongwx

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AlphabetFormApp.exe
    "C:\Users\Admin\AppData\Local\Temp\AlphabetFormApp.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\AlphabetFormApp.exe
      "C:\Users\Admin\AppData\Local\Temp\AlphabetFormApp.exe" Alphabet
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:832
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AlphabetFormApp.exe.log

    Filesize

    2KB

    MD5

    3eae0f67f2ad2e5e64c88b9f98646570

    SHA1

    5e9387e21a3fe785feef60a9928947d4af1108ac

    SHA256

    e97cf72a04446346c7caeed79c7a0bbe9458adfb272562bcbfff3a2d7f598c1f

    SHA512

    a16c27dc14093364881c66eff9efbdd3992ba7266522b48239cdbe880f0fb50e9d94bf1503b0d1806a46ec39102276275573023ed1c035612e666c0b910fa7da

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\3a39ee7e.dll

    Filesize

    51KB

    MD5

    878834b2060be6e451882b09514a9112

    SHA1

    24424a79e0db9cbb0f10b6bcdd8ab2c6ef0b5e7d

    SHA256

    0b9708fb70daded5f7462e0b36525d017da57e6c417fa04973459c66f9d0ff18

    SHA512

    52ec6ecc5a3fabacebe84bfa4072b64649dc70e2365bee425f01d231c792a718e6e33ad1df8b2709d618f8edfa18a69f57080d5b3f7f4b921d5f39e4cb54ac3e

  • memory/832-149-0x00007FF9F5050000-0x00007FF9F5B11000-memory.dmp

    Filesize

    10.8MB

  • memory/832-143-0x00007FF9F5050000-0x00007FF9F5B11000-memory.dmp

    Filesize

    10.8MB

  • memory/832-144-0x000001BE39F20000-0x000001BE39F30000-memory.dmp

    Filesize

    64KB

  • memory/832-150-0x000001BE39F20000-0x000001BE39F30000-memory.dmp

    Filesize

    64KB

  • memory/832-198-0x00007FF9F5050000-0x00007FF9F5B11000-memory.dmp

    Filesize

    10.8MB

  • memory/1552-145-0x00007FF9F5050000-0x00007FF9F5B11000-memory.dmp

    Filesize

    10.8MB

  • memory/1552-146-0x000001BEB0220000-0x000001BEB026A000-memory.dmp

    Filesize

    296KB

  • memory/1552-147-0x000001BEB0270000-0x000001BEB02A2000-memory.dmp

    Filesize

    200KB

  • memory/1552-148-0x000001BEAEB20000-0x000001BEAEB30000-memory.dmp

    Filesize

    64KB

  • memory/1552-133-0x000001BE94150000-0x000001BE94466000-memory.dmp

    Filesize

    3.1MB

  • memory/1552-135-0x000001BEAEB20000-0x000001BEAEB30000-memory.dmp

    Filesize

    64KB

  • memory/1552-196-0x00007FF9F5050000-0x00007FF9F5B11000-memory.dmp

    Filesize

    10.8MB

  • memory/1552-134-0x00007FF9F5050000-0x00007FF9F5B11000-memory.dmp

    Filesize

    10.8MB