Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 12:31
Behavioral task
behavioral1
Sample
good.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
good.exe
Resource
win10v2004-20231130-en
General
-
Target
good.exe
-
Size
1.6MB
-
MD5
81e30f580f1a0b6d719c84658469179d
-
SHA1
125c7c16efadafcb7e8c9374c4b034f8714f5da1
-
SHA256
9596077ce994b0a259cad7d45f7c848a763d913ae2fb3e86c21ec4b15b1255e5
-
SHA512
2d02bfe821a7e7b03f91ba53b9874f2420bcf237ae14d97b77753c30e74979286b0a3ca431724f5746462000c9fd6756da24937b52ef9ef2d8efe80d2dd33770
-
SSDEEP
49152:qWg8wUmZOzqiavjDUJO/WH89ctcO0ljbbQnIQGotBKqy8TJCHEGU42sn6:ZiUmZOzqiavjDUM/WH89y8bboGO
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk good.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe Key opened \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe Key opened \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" good.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 ipinfo.io 50 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy good.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini good.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol good.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI good.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2680 3768 WerFault.exe 61 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 good.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString good.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5072 schtasks.exe 3632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3768 good.exe 3768 good.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3768 wrote to memory of 5072 3768 good.exe 87 PID 3768 wrote to memory of 5072 3768 good.exe 87 PID 3768 wrote to memory of 5072 3768 good.exe 87 PID 3768 wrote to memory of 3632 3768 good.exe 91 PID 3768 wrote to memory of 3632 3768 good.exe 91 PID 3768 wrote to memory of 3632 3768 good.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\good.exe"C:\Users\Admin\AppData\Local\Temp\good.exe"1⤵
- Drops startup file
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3768 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:5072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 18042⤵
- Program crash
PID:2680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3768 -ip 37681⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD581e30f580f1a0b6d719c84658469179d
SHA1125c7c16efadafcb7e8c9374c4b034f8714f5da1
SHA2569596077ce994b0a259cad7d45f7c848a763d913ae2fb3e86c21ec4b15b1255e5
SHA5122d02bfe821a7e7b03f91ba53b9874f2420bcf237ae14d97b77753c30e74979286b0a3ca431724f5746462000c9fd6756da24937b52ef9ef2d8efe80d2dd33770
-
Filesize
3KB
MD5162e94c32e0a34a9f9ec199d7fbadb4c
SHA137c3311d85dcdb203d68400987419cc9e4e2c0be
SHA25619e84cb2aa9ce833e485e62024104d3c94b4adb12f7ac81ecf40e99549857080
SHA5123cd0e7031c6c213a714c1ea57332335cd9a7177d4b25d6987f677979bf97ebb0bbae4e62d801d8a0e9f7bec921370474c86523c8cb2b4651f7af23f53b206cd2