Analysis
-
max time kernel
101s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-12-2023 03:15
Static task
static1
Behavioral task
behavioral1
Sample
a016c13d92b2950a5494db8916dd77ba.exe
Resource
win7-20231215-en
General
-
Target
a016c13d92b2950a5494db8916dd77ba.exe
-
Size
709KB
-
MD5
a016c13d92b2950a5494db8916dd77ba
-
SHA1
8113747da58ffaf3964850704eed9ae32eeed846
-
SHA256
0614874d49a085d84f0a2a71f370dff23a9898ee64a190d6cade492e4b91643d
-
SHA512
2fe6ec7044276bc6d1631db75edd14dd6f7f756a1240580b686b7f93328726b7f4553a47db0b7c36624f919f9a81e17eb99e73225f9ff085de252133325bec76
-
SSDEEP
12288:hnSLWoo7Zhx72JkQZvvkFMuYrIFmmh6JiBaA6Pt83cCS:RSLWZj7PQ5LamgaHV8zS
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
samsung@@
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 whatismyipaddress.com 4 whatismyipaddress.com 5 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2176 set thread context of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 set thread context of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 1536 1656 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2176 a016c13d92b2950a5494db8916dd77ba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2176 a016c13d92b2950a5494db8916dd77ba.exe Token: SeDebugPrivilege 1644 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2176 a016c13d92b2950a5494db8916dd77ba.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1644 2176 a016c13d92b2950a5494db8916dd77ba.exe 29 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 2176 wrote to memory of 1656 2176 a016c13d92b2950a5494db8916dd77ba.exe 31 PID 1656 wrote to memory of 1536 1656 vbc.exe 33 PID 1656 wrote to memory of 1536 1656 vbc.exe 33 PID 1656 wrote to memory of 1536 1656 vbc.exe 33 PID 1656 wrote to memory of 1536 1656 vbc.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a016c13d92b2950a5494db8916dd77ba.exe"C:\Users\Admin\AppData\Local\Temp\a016c13d92b2950a5494db8916dd77ba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"2⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 1563⤵
- Program crash
PID:1536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346B
MD5bb9abd3bb64d59d1d53c31e692393855
SHA18cd1fc197abb980d1f0e762c53cd49cc9a7d4abf
SHA256c6aad7f9a9d0f9a3ee369074c014d01b20c3088c1cfebb7f07bd405d175cbcb2
SHA5120dcafab20d0b7ebbd5057cbb6119566e1ed6d124bdd999cacdd00641193dc93033b9d066e13a9e40ba29ab973ebbbe2303e7eaa9b1a6a85aa2a0d56c863c112d