Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2023 11:27
Behavioral task
behavioral1
Sample
g8ae371b2e5be4d5d2d0c05.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
g8ae371b2e5be4d5d2d0c05.exe
Resource
win10v2004-20230831-en
General
-
Target
g8ae371b2e5be4d5d2d0c05.exe
-
Size
290KB
-
MD5
24acb6ae0ce3f02db7e54d5938e6fa0e
-
SHA1
7da01643bf195b0b11e0afbcf0c4c65056c54627
-
SHA256
fe3f4e398b6d08758c70582e76aaf99c5f917de8a05ad9d67a884a07f695f015
-
SHA512
a4125cb350943943223f6def0e6a06b05bebc85d0af857a04471cc93c1a2f605fc305301a1d91814c31a4c58a4d973c3ae0180fffe15d4d2ae178fc845d7371e
-
SSDEEP
6144:0GPJDpTxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9t0B9bdKoqeUIJkDa:7RpmWHgf8Y6/Qp1nLiDKkKyka
Malware Config
Signatures
-
Detect Gurcu Stealer V3 payload 1 IoCs
resource yara_rule behavioral2/memory/2648-0-0x0000020763490000-0x00000207634DE000-memory.dmp family_gurcu_v3 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe Key opened \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe Key opened \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 g8ae371b2e5be4d5d2d0c05.exe 2648 g8ae371b2e5be4d5d2d0c05.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 g8ae371b2e5be4d5d2d0c05.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3696 2648 g8ae371b2e5be4d5d2d0c05.exe 85 PID 2648 wrote to memory of 3696 2648 g8ae371b2e5be4d5d2d0c05.exe 85 PID 3696 wrote to memory of 2620 3696 cmd.exe 87 PID 3696 wrote to memory of 2620 3696 cmd.exe 87 PID 3696 wrote to memory of 740 3696 cmd.exe 88 PID 3696 wrote to memory of 740 3696 cmd.exe 88 PID 3696 wrote to memory of 4432 3696 cmd.exe 89 PID 3696 wrote to memory of 4432 3696 cmd.exe 89 PID 2648 wrote to memory of 2452 2648 g8ae371b2e5be4d5d2d0c05.exe 90 PID 2648 wrote to memory of 2452 2648 g8ae371b2e5be4d5d2d0c05.exe 90 PID 2452 wrote to memory of 2348 2452 cmd.exe 92 PID 2452 wrote to memory of 2348 2452 cmd.exe 92 PID 2452 wrote to memory of 4112 2452 cmd.exe 93 PID 2452 wrote to memory of 4112 2452 cmd.exe 93 PID 2452 wrote to memory of 4808 2452 cmd.exe 94 PID 2452 wrote to memory of 4808 2452 cmd.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\g8ae371b2e5be4d5d2d0c05.exe"C:\Users\Admin\AppData\Local\Temp\g8ae371b2e5be4d5d2d0c05.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2648 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"2⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2620
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles3⤵PID:740
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"3⤵PID:4432
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2348
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵PID:4112
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"3⤵PID:4808
-
-