Analysis

  • max time kernel
    126s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 10:51

General

  • Target

    NEAS.832b9a9547e83aa4077508bb186cd75f02ad3bc092837a72b349b2e12f693aa3.exe

  • Size

    2.5MB

  • MD5

    09419bfb2aac3be2fb0caa3d41ab94b2

  • SHA1

    ddd3573b190df7aa10656d745c6a43dd587f3892

  • SHA256

    832b9a9547e83aa4077508bb186cd75f02ad3bc092837a72b349b2e12f693aa3

  • SHA512

    34da50bb3b033fd88a276403d904076b37288358d1af5f6f756f6602974202e6aac863f039380e4721f575e241e3dd93967d962ec682700501466b51eecc6a95

  • SSDEEP

    24576:dNvZpYhiotNlzjSp29J9zqorRvwCkUjo+pZz8sLdP30VbUCX0oW4kAihwg08YzLc:PY/i29J9zqzUjB7zWUCX0tNRIq

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.832b9a9547e83aa4077508bb186cd75f02ad3bc092837a72b349b2e12f693aa3.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.832b9a9547e83aa4077508bb186cd75f02ad3bc092837a72b349b2e12f693aa3.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\NEAS.832b9a9547e83aa4077508bb186cd75f02ad3bc092837a72b349b2e12f693aa3.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.832b9a9547e83aa4077508bb186cd75f02ad3bc092837a72b349b2e12f693aa3.exe
      2⤵
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\NEAS.832b9a9547e83aa4077508bb186cd75f02ad3bc092837a72b349b2e12f693aa3.exe.log

          Filesize

          1KB

          MD5

          9f5d0107d96d176b1ffcd5c7e7a42dc9

          SHA1

          de83788e2f18629555c42a3e6fada12f70457141

          SHA256

          d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097

          SHA512

          86cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61

        • C:\Users\Admin\AppData\Local\Temp\Costura\1485B29524EF63EB83DF771D39CCA767\64\sqlite.interop.dll

          Filesize

          1.7MB

          MD5

          02f50a23e31d1f21aa21ae52faf3c05a

          SHA1

          5b21234729dedfa1b456138872ef2a046b9ee86f

          SHA256

          5f0e72e1839db4aa41f560e0a68c7a95c9e1656bc2f4f4ff64803655d02e5272

          SHA512

          bc2fcca125506d9b762df4e9df24a907b9e554d857e705945ae252e7e6b50dada043ef0e69828b780ac9b569053fcf912c27a770469a80f1f6094c146afdb9b0

        • C:\Users\Admin\AppData\Local\Temp\Epcwru.tmp

          Filesize

          148KB

          MD5

          90a1d4b55edf36fa8b4cc6974ed7d4c4

          SHA1

          aba1b8d0e05421e7df5982899f626211c3c4b5c1

          SHA256

          7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

          SHA512

          ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

        • C:\Users\Admin\AppData\Local\Temp\Hcgquxvcil.tmp

          Filesize

          124KB

          MD5

          9618e15b04a4ddb39ed6c496575f6f95

          SHA1

          1c28f8750e5555776b3c80b187c5d15a443a7412

          SHA256

          a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

          SHA512

          f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

        • memory/2536-0-0x000002C211EB0000-0x000002C21212C000-memory.dmp

          Filesize

          2.5MB

        • memory/2536-1-0x000002C22C5B0000-0x000002C22C6C2000-memory.dmp

          Filesize

          1.1MB

        • memory/2536-2-0x000002C22C6C0000-0x000002C22C7CE000-memory.dmp

          Filesize

          1.1MB

        • memory/2536-4-0x000002C2124C0000-0x000002C2124D0000-memory.dmp

          Filesize

          64KB

        • memory/2536-3-0x00007FFCC5600000-0x00007FFCC60C1000-memory.dmp

          Filesize

          10.8MB

        • memory/2536-5-0x000002C22C7D0000-0x000002C22C8C6000-memory.dmp

          Filesize

          984KB

        • memory/2536-6-0x000002C22C8D0000-0x000002C22C9C6000-memory.dmp

          Filesize

          984KB

        • memory/2536-7-0x000002C22C9D0000-0x000002C22CA1C000-memory.dmp

          Filesize

          304KB

        • memory/2536-14-0x00007FFCC5600000-0x00007FFCC60C1000-memory.dmp

          Filesize

          10.8MB

        • memory/4016-10-0x0000000140000000-0x00000001400D0000-memory.dmp

          Filesize

          832KB

        • memory/4016-16-0x000002996B110000-0x000002996B120000-memory.dmp

          Filesize

          64KB

        • memory/4016-15-0x00007FFCC5600000-0x00007FFCC60C1000-memory.dmp

          Filesize

          10.8MB

        • memory/4016-13-0x000002996B120000-0x000002996B228000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-17-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-18-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-20-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-22-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-24-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-26-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-28-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-30-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-32-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-34-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-36-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-38-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-40-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-46-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-50-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-48-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-54-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-52-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-44-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-42-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-56-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-58-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-60-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-62-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-64-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-66-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-68-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-70-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-72-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-74-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-76-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-78-0x000002996B120000-0x000002996B223000-memory.dmp

          Filesize

          1.0MB

        • memory/4016-2205-0x000002996B230000-0x000002996B2CE000-memory.dmp

          Filesize

          632KB

        • memory/4016-2206-0x000002996B3D0000-0x000002996B5E0000-memory.dmp

          Filesize

          2.1MB

        • memory/4016-2211-0x00007FFCC5600000-0x00007FFCC60C1000-memory.dmp

          Filesize

          10.8MB

        • memory/4016-2212-0x000002996B110000-0x000002996B120000-memory.dmp

          Filesize

          64KB

        • memory/4016-2213-0x000002996B5E0000-0x000002996B65A000-memory.dmp

          Filesize

          488KB

        • memory/4016-2214-0x000002996B6B0000-0x000002996B71C000-memory.dmp

          Filesize

          432KB

        • memory/4016-2217-0x000002996BAA0000-0x000002996BADA000-memory.dmp

          Filesize

          232KB

        • memory/4016-2218-0x000002996BA60000-0x000002996BA86000-memory.dmp

          Filesize

          152KB

        • memory/4016-2259-0x00007FFCC5600000-0x00007FFCC60C1000-memory.dmp

          Filesize

          10.8MB