Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 02:22

General

  • Target

    e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd.exe

  • Size

    10KB

  • MD5

    aa4bdc6e4bc363b5e942abb6e91beb52

  • SHA1

    ff8dd39d6c617eaf61cb77e1cc8bed86324fe449

  • SHA256

    e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd

  • SHA512

    6abbeeee95f98a86f4aeb391c4711f84339d17d28a75651c45e7563eec8fe0503b65142a443d6278c0413fc94e9c0bd6ec17bbcb74ad56b7b2f49b0af5d8fcd1

  • SSDEEP

    192:M2XJ7wmVth/4sSAV1zuZfiiLX2HS9yxSyrsRt8G3mSF6zEdst:MU+mm2Qiiay9ycyrsR2vZAds

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd.exe
    "C:\Users\Admin\AppData\Local\Temp\e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd.exe
      C:\Users\Admin\AppData\Local\Temp\e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:512
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd' -Value '"C:\Users\Admin\AppData\Local\Temp\e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd.exe"' -PropertyType 'String'
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\e54a10d5f2679cf96e33d264734763b1864c859cd2fe666e9d803a081d521bcd.exe.log

    Filesize

    1KB

    MD5

    159a40ccfd419bd60a20a1c278edaafd

    SHA1

    09bc35e46135b6b44c609fe6514ab7e2c8696a99

    SHA256

    24487f4b6318683dcd81970e9f57fb45167575f687f7831a563176e20da657b6

    SHA512

    b5c5b8c23479afff6b72c37c2cc1204c079ae003bae586d082d2b05acfdab8753fea78c5e53f692e4a45aba6746703d9ca99a2d0fa7bd88a7f35a910d1ad1ff3

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_klm04ryq.0g4.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/512-45-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-2206-0x00000200EDFC0000-0x00000200EE05E000-memory.dmp

    Filesize

    632KB

  • memory/512-15-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB

  • memory/512-9-0x0000000140000000-0x00000001400D0000-memory.dmp

    Filesize

    832KB

  • memory/512-49-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-2226-0x00000200EE1D0000-0x00000200EE24A000-memory.dmp

    Filesize

    488KB

  • memory/512-2207-0x00000200D3DB0000-0x00000200D3DD6000-memory.dmp

    Filesize

    152KB

  • memory/512-47-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-989-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB

  • memory/512-984-0x00000200D56C0000-0x00000200D56D0000-memory.dmp

    Filesize

    64KB

  • memory/512-77-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-17-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-16-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-19-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-21-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-23-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-25-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-27-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-29-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-31-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-33-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-35-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-37-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-39-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-41-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-43-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-12-0x00000200D56C0000-0x00000200D56D0000-memory.dmp

    Filesize

    64KB

  • memory/512-13-0x00000200EDEB0000-0x00000200EDFB8000-memory.dmp

    Filesize

    1.0MB

  • memory/512-2253-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB

  • memory/512-51-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-53-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-55-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-57-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-59-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-61-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-63-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-65-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-69-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-71-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-67-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-73-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/512-75-0x00000200EDEB0000-0x00000200EDFB4000-memory.dmp

    Filesize

    1.0MB

  • memory/3412-1-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB

  • memory/3412-14-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB

  • memory/3412-5-0x0000022BF0720000-0x0000022BF0730000-memory.dmp

    Filesize

    64KB

  • memory/3412-4-0x0000022BF0970000-0x0000022BF0A78000-memory.dmp

    Filesize

    1.0MB

  • memory/3412-3-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB

  • memory/3412-7-0x0000022BD7F30000-0x0000022BD7F7C000-memory.dmp

    Filesize

    304KB

  • memory/3412-2-0x0000022BF0720000-0x0000022BF0730000-memory.dmp

    Filesize

    64KB

  • memory/3412-0-0x0000022BD61A0000-0x0000022BD61A8000-memory.dmp

    Filesize

    32KB

  • memory/3412-6-0x0000022BF0A80000-0x0000022BF0B76000-memory.dmp

    Filesize

    984KB

  • memory/4252-2266-0x000001C573B80000-0x000001C573BA2000-memory.dmp

    Filesize

    136KB

  • memory/4252-2256-0x000001C573BD0000-0x000001C573BE0000-memory.dmp

    Filesize

    64KB

  • memory/4252-2255-0x000001C573BD0000-0x000001C573BE0000-memory.dmp

    Filesize

    64KB

  • memory/4252-2254-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB

  • memory/4252-2268-0x00007FFD60270000-0x00007FFD60D31000-memory.dmp

    Filesize

    10.8MB