Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2023 02:39
Behavioral task
behavioral1
Sample
5e38bce5b175e470433f314ed3873cc8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e38bce5b175e470433f314ed3873cc8.exe
Resource
win10v2004-20231127-en
General
-
Target
5e38bce5b175e470433f314ed3873cc8.exe
-
Size
1.6MB
-
MD5
5e38bce5b175e470433f314ed3873cc8
-
SHA1
567325adefc324f0fefd07a6c021d94a246d7d05
-
SHA256
32a152f5e46b11a74987365bc083824b43f283620c0d813cb1f1e37520a1f36c
-
SHA512
2e98f347222f0f969868ad0fa34c306ea6a7ffb8a4757fdd85652418cf7430ca1fbffa22d0bce9c71baf820088fbce1a7ab948c77023063381af633c1df289b5
-
SSDEEP
49152:qWg8wUmZOzqiavjDUJO/WH89ctcO0ljbbQnIQGotBKqy8TJCHEGU42sn6:ZiUmZOzqiavjDUM/WH89y8bboGO
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 5e38bce5b175e470433f314ed3873cc8.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5e38bce5b175e470433f314ed3873cc8.exe Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5e38bce5b175e470433f314ed3873cc8.exe Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5e38bce5b175e470433f314ed3873cc8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 5e38bce5b175e470433f314ed3873cc8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ipinfo.io 23 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy 5e38bce5b175e470433f314ed3873cc8.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 5e38bce5b175e470433f314ed3873cc8.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 5e38bce5b175e470433f314ed3873cc8.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 5e38bce5b175e470433f314ed3873cc8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2240 2660 WerFault.exe 87 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5e38bce5b175e470433f314ed3873cc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5e38bce5b175e470433f314ed3873cc8.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4444 schtasks.exe 4084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 5e38bce5b175e470433f314ed3873cc8.exe 2660 5e38bce5b175e470433f314ed3873cc8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4444 2660 5e38bce5b175e470433f314ed3873cc8.exe 88 PID 2660 wrote to memory of 4444 2660 5e38bce5b175e470433f314ed3873cc8.exe 88 PID 2660 wrote to memory of 4444 2660 5e38bce5b175e470433f314ed3873cc8.exe 88 PID 2660 wrote to memory of 4084 2660 5e38bce5b175e470433f314ed3873cc8.exe 92 PID 2660 wrote to memory of 4084 2660 5e38bce5b175e470433f314ed3873cc8.exe 92 PID 2660 wrote to memory of 4084 2660 5e38bce5b175e470433f314ed3873cc8.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5e38bce5b175e470433f314ed3873cc8.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5e38bce5b175e470433f314ed3873cc8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e38bce5b175e470433f314ed3873cc8.exe"C:\Users\Admin\AppData\Local\Temp\5e38bce5b175e470433f314ed3873cc8.exe"1⤵
- Drops startup file
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2660 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:4444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 17842⤵
- Program crash
PID:2240
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2660 -ip 26601⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55e38bce5b175e470433f314ed3873cc8
SHA1567325adefc324f0fefd07a6c021d94a246d7d05
SHA25632a152f5e46b11a74987365bc083824b43f283620c0d813cb1f1e37520a1f36c
SHA5122e98f347222f0f969868ad0fa34c306ea6a7ffb8a4757fdd85652418cf7430ca1fbffa22d0bce9c71baf820088fbce1a7ab948c77023063381af633c1df289b5
-
Filesize
3KB
MD5ea3c9fe0da8eaa1f2fe94eb579025b81
SHA13e1b13ec6f3a0b8b52c36940c6b0bb71a98db488
SHA256c85e601f3586804b1133b9a36f4495b718b47bbc4c5109cc57accdcb1488c1ce
SHA51296b4942b8119bcf0630b7e18f56fd123e9c79bcaab2b19783a0c93ee4414fcf4446e90fbd584ef97c66bb1fa4a47ee9bad622c07df7f2416042172bc84fe7851