Analysis
-
max time kernel
145s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 04:24
Behavioral task
behavioral1
Sample
g8ae371b2e5be4d5d2d0c05.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
g8ae371b2e5be4d5d2d0c05.exe
Resource
win10v2004-20230915-en
General
-
Target
g8ae371b2e5be4d5d2d0c05.exe
-
Size
290KB
-
MD5
24acb6ae0ce3f02db7e54d5938e6fa0e
-
SHA1
7da01643bf195b0b11e0afbcf0c4c65056c54627
-
SHA256
fe3f4e398b6d08758c70582e76aaf99c5f917de8a05ad9d67a884a07f695f015
-
SHA512
a4125cb350943943223f6def0e6a06b05bebc85d0af857a04471cc93c1a2f605fc305301a1d91814c31a4c58a4d973c3ae0180fffe15d4d2ae178fc845d7371e
-
SSDEEP
6144:0GPJDpTxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9t0B9bdKoqeUIJkDa:7RpmWHgf8Y6/Qp1nLiDKkKyka
Malware Config
Signatures
-
Detect Gurcu Stealer V3 payload 1 IoCs
resource yara_rule behavioral2/memory/4980-0-0x0000019558CD0000-0x0000019558D1E000-memory.dmp family_gurcu_v3 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe Key opened \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe Key opened \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4980 g8ae371b2e5be4d5d2d0c05.exe 4980 g8ae371b2e5be4d5d2d0c05.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4980 g8ae371b2e5be4d5d2d0c05.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4980 wrote to memory of 216 4980 g8ae371b2e5be4d5d2d0c05.exe 86 PID 4980 wrote to memory of 216 4980 g8ae371b2e5be4d5d2d0c05.exe 86 PID 216 wrote to memory of 4988 216 cmd.exe 88 PID 216 wrote to memory of 4988 216 cmd.exe 88 PID 216 wrote to memory of 3808 216 cmd.exe 89 PID 216 wrote to memory of 3808 216 cmd.exe 89 PID 216 wrote to memory of 1184 216 cmd.exe 90 PID 216 wrote to memory of 1184 216 cmd.exe 90 PID 4980 wrote to memory of 3060 4980 g8ae371b2e5be4d5d2d0c05.exe 91 PID 4980 wrote to memory of 3060 4980 g8ae371b2e5be4d5d2d0c05.exe 91 PID 3060 wrote to memory of 3964 3060 cmd.exe 93 PID 3060 wrote to memory of 3964 3060 cmd.exe 93 PID 3060 wrote to memory of 2728 3060 cmd.exe 94 PID 3060 wrote to memory of 2728 3060 cmd.exe 94 PID 3060 wrote to memory of 4032 3060 cmd.exe 95 PID 3060 wrote to memory of 4032 3060 cmd.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 g8ae371b2e5be4d5d2d0c05.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\g8ae371b2e5be4d5d2d0c05.exe"C:\Users\Admin\AppData\Local\Temp\g8ae371b2e5be4d5d2d0c05.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4980 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4988
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles3⤵PID:3808
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"3⤵PID:1184
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3964
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵PID:2728
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"3⤵PID:4032
-
-