Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 08:45

General

  • Target

    build838.exe

  • Size

    370KB

  • MD5

    baea8727cf8923018d8235c66ae8d6a1

  • SHA1

    42750ff80df0ea75d1dc27484bb6775cf8065003

  • SHA256

    2d37d22eceb8632c2d94f155e17db628125d658a336e79725d757d13b657dc5d

  • SHA512

    b9cd9cceeaa618395dbf486c83687b0a922a29734d5a3d463e3bf1143345416ad4e985184cca03ec59a7c5397270cfd2e3ebd06b620a2746642b17dea2d34866

  • SSDEEP

    6144:mMZ+4tD/t/a2zDGVPJXvnzZjDJHb571Kjn1929XDccHOL9bqY4S6X30/Y+59Y:T+GRatpvnzZjDv7oj19yTNYVwEe

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build838.exe
    "C:\Users\Admin\AppData\Local\Temp\build838.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:2220

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2220-0-0x000002857D000000-0x000002857D062000-memory.dmp

          Filesize

          392KB

        • memory/2220-1-0x00007FFCE26E0000-0x00007FFCE31A1000-memory.dmp

          Filesize

          10.8MB

        • memory/2220-2-0x000002857F790000-0x000002857F7A0000-memory.dmp

          Filesize

          64KB

        • memory/2220-3-0x00007FFCE26E0000-0x00007FFCE31A1000-memory.dmp

          Filesize

          10.8MB

        • memory/2220-4-0x000002857F790000-0x000002857F7A0000-memory.dmp

          Filesize

          64KB