Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
45edc00783917c5995cb40ffe6a82b74.exe
Resource
win7-20231215-en
General
-
Target
45edc00783917c5995cb40ffe6a82b74.exe
-
Size
1.1MB
-
MD5
45edc00783917c5995cb40ffe6a82b74
-
SHA1
62f4563a5d19b33135192e712ec56348fa64511f
-
SHA256
cc05b8bfca420cf34c2f8625a43cc83914d507b8c9b65f466df0a3d7030c970b
-
SHA512
b555f139e10775a481abca83ed1b17a97bf04f227ef2caa3a3404adc6587c96c8b4e9aae04e195c4f8b8004feda7fa2f5caa0b77301fdad9cf10158459c22d1f
-
SSDEEP
12288:ilO6vQM/PuwMpPMasrHwUFjq16QYBh0RLUXusY+hVKt8Dl5YchUJlyAKp:muoPu1dMasrnFAiQUc+PKeDDJUlWp
Malware Config
Extracted
Protocol: smtp- Host:
mail.dracik.sk - Port:
587 - Username:
[email protected] - Password:
NoVeHe5L00jhj
Signatures
-
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4676-12-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral2/memory/4404-25-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4404-27-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4404-23-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 5 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4676-12-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral2/memory/4468-31-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4468-32-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4468-29-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4468-39-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 8 IoCs
resource yara_rule behavioral2/memory/4676-12-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral2/memory/4404-25-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4404-27-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4404-23-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4468-31-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4468-32-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4468-29-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4468-39-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 126 whatismyipaddress.com 128 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1072 set thread context of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 4676 set thread context of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 set thread context of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4468 vbc.exe 4468 vbc.exe 4676 45edc00783917c5995cb40ffe6a82b74.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4676 45edc00783917c5995cb40ffe6a82b74.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 1072 wrote to memory of 4676 1072 45edc00783917c5995cb40ffe6a82b74.exe 104 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4404 4676 45edc00783917c5995cb40ffe6a82b74.exe 105 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106 PID 4676 wrote to memory of 4468 4676 45edc00783917c5995cb40ffe6a82b74.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\45edc00783917c5995cb40ffe6a82b74.exe"C:\Users\Admin\AppData\Local\Temp\45edc00783917c5995cb40ffe6a82b74.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\45edc00783917c5995cb40ffe6a82b74.exe"C:\Users\Admin\AppData\Local\Temp\45edc00783917c5995cb40ffe6a82b74.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:4404
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\45edc00783917c5995cb40ffe6a82b74.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196