Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30/09/2023, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe
Resource
win10v2004-20230915-en
General
-
Target
avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe
-
Size
200KB
-
MD5
2403072d939599e88431e5d0ed0e2b1b
-
SHA1
507d6e48c7d74af7651a1af5e1d0844f45f9c263
-
SHA256
5ad0285de999973d1a665bcfe5d7040494f64c113d8ef8664d3bda3ae66b8d67
-
SHA512
5ecf81cd8be3ed57da1dbc063e517ffda89f4694356cd3ea5b2ea03c4dd53038a88655486e43d4f3d62c5b356072a6918a10b6befa7244634cea1d268aa111b6
-
SSDEEP
3072:K73LYJiZfUO7JAkH+wWtaiYGlIQZboLRi9ua/aHyvh1d2itL:K77gIfU2T7ZGlVbA
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2620 audiodg.exe 1632 audiodg.exe 1404 audiodg.exe 2632 audiodg.exe 2764 audiodg.exe 2772 audiodg.exe -
Loads dropped DLL 6 IoCs
pid Process 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe 2620 audiodg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe Token: SeDebugPrivilege 2620 audiodg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2620 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe 30 PID 1740 wrote to memory of 2620 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe 30 PID 1740 wrote to memory of 2620 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe 30 PID 1740 wrote to memory of 2620 1740 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe 30 PID 2620 wrote to memory of 1632 2620 audiodg.exe 33 PID 2620 wrote to memory of 1632 2620 audiodg.exe 33 PID 2620 wrote to memory of 1632 2620 audiodg.exe 33 PID 2620 wrote to memory of 1632 2620 audiodg.exe 33 PID 2620 wrote to memory of 1404 2620 audiodg.exe 34 PID 2620 wrote to memory of 1404 2620 audiodg.exe 34 PID 2620 wrote to memory of 1404 2620 audiodg.exe 34 PID 2620 wrote to memory of 1404 2620 audiodg.exe 34 PID 2620 wrote to memory of 2632 2620 audiodg.exe 35 PID 2620 wrote to memory of 2632 2620 audiodg.exe 35 PID 2620 wrote to memory of 2632 2620 audiodg.exe 35 PID 2620 wrote to memory of 2632 2620 audiodg.exe 35 PID 2620 wrote to memory of 2764 2620 audiodg.exe 36 PID 2620 wrote to memory of 2764 2620 audiodg.exe 36 PID 2620 wrote to memory of 2764 2620 audiodg.exe 36 PID 2620 wrote to memory of 2764 2620 audiodg.exe 36 PID 2620 wrote to memory of 2772 2620 audiodg.exe 37 PID 2620 wrote to memory of 2772 2620 audiodg.exe 37 PID 2620 wrote to memory of 2772 2620 audiodg.exe 37 PID 2620 wrote to memory of 2772 2620 audiodg.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe"C:\Users\Admin\AppData\Local\Temp\avira_en_vpnb0_19374396-127457345__pvpnws-spotlightvpnadw-test.exe"1⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"C:\Users\Admin\AppData\Local\Temp\audiodg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"{path}"3⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"{path}"3⤵
- Executes dropped EXE
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"{path}"3⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"{path}"3⤵
- Executes dropped EXE
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"{path}"3⤵
- Executes dropped EXE
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967
-
Filesize
694KB
MD5a1f785bfdea5c75ed569fc48681eb610
SHA189eb5b87feb47c6d47386555658aa6308e0ffef3
SHA25683cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b
SHA5127fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967