Analysis
-
max time kernel
177s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe
-
Size
388KB
-
MD5
39d50cae6f15bbd0a4d4b6c54e9a7dd0
-
SHA1
414142d3437a6a38397cb223fdaf00167c3a9e2a
-
SHA256
57991cec96b70731ed93dac0cf6274db963207d96187888899d0731125fcf2fe
-
SHA512
795dce0a07e76468361c8cbc9078d5dbfeb947e434e154dd7c9f2d383286abd9a06d3e40622979b550f200ee68ea198add998e072ee303e1693e9d0bb22ee8ef
-
SSDEEP
6144:5Vg+w3FxOpKwV9lC0OYKXV1b9DKcNUWWgriFCwG2LhfF3ybOH5tSkwK0OAFRY/6:23q8wFeXVDKc+WW04zvhCaSXK0OAFR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 EE36.tmp -
Loads dropped DLL 2 IoCs
pid Process 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\RTFHTML.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\USP10.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\MSLID.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msolap100.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCFU.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\TRANSMGR.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7ES.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search5.api EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLMAPI32.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7EN.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7ES.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe EE36.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Onix32.dll EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\ITIRCL55.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnOL.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCNPST32.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\JPEGIM32.FLT EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEREP.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Csi.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCF.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXPSRV.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OL.SAM EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\NPSWF32.dll EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\msdia90.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OFFOWC.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnPPT.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMABLT32.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INTLDATE.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENVELOPE.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEAWSDC.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPDESIGN.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OWSCLT.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGM.dll EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annots.api EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WPFT532.CNV EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\FPSRVUTL.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\UmOutlookAddin.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NL7Data0011.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNoteSyncPC.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLSLICER.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\ANALYS32.XLL EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ACE.dll EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\hxds.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSAutogen.dll EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPEDITOR.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLCTL.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\MSVCR71.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ACT3.SAM EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.dll EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d EE36.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\ADMPlugin.apl EE36.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\MSOSV.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLMAIL.FAE EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\DBGHELP.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MIMEDIR.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OARTCONV.DLL EE36.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\THOCRAPI.DLL EE36.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ahclient.dll EE36.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll EE36.tmp File created C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\wpfgfx_v0300.dll EE36.tmp File created C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll EE36.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 2692 320 WerFault.exe 1 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 320 wrote to memory of 2012 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 30 PID 320 wrote to memory of 2012 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 30 PID 320 wrote to memory of 2012 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 30 PID 320 wrote to memory of 2012 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 30 PID 320 wrote to memory of 2692 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 31 PID 320 wrote to memory of 2692 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 31 PID 320 wrote to memory of 2692 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 31 PID 320 wrote to memory of 2692 320 39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\39d50cae6f15bbd0a4d4b6c54e9a7dd0_exe32.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\EE36.tmpC:\Users\Admin\AppData\Local\Temp\EE36.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 1602⤵
- Program crash
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666