Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
03dd31fc3faca182bd4c0dec23274254.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03dd31fc3faca182bd4c0dec23274254.exe
Resource
win10v2004-20231215-en
General
-
Target
03dd31fc3faca182bd4c0dec23274254.exe
-
Size
816KB
-
MD5
03dd31fc3faca182bd4c0dec23274254
-
SHA1
9c94203812d69e6c964dad84e39f31e45b5357fa
-
SHA256
45e5751506fe45c4587963c66217bfe2605f55ae1026b80a12e9856711e12517
-
SHA512
7ec58ffc04679b0da65700c0559f2db39f17a8c1235ca17ca44ffba3a1bac4c2b63c1b8172c9d532e9574d6dfc675afc6b87b7523b80e3d987fa04597a3dde97
-
SSDEEP
24576:THIPmfiJ8fEdNQmf6YyPs2E7Y8nyWZE1ciBh:j2mfffEdNQCodE7iW6T
Malware Config
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4620-38-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral2/memory/4620-39-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 24 IoCs
resource yara_rule behavioral2/memory/2412-20-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/2412-21-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/2412-23-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/1100-30-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral2/memory/1100-31-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral2/memory/1100-32-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral2/memory/4620-38-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/4620-39-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/4584-44-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/4584-45-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/4584-48-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/2964-55-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral2/memory/2964-57-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral2/memory/3476-63-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3476-64-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3476-65-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/1440-67-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral2/memory/1440-69-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral2/memory/1440-70-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral2/memory/3992-75-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral2/memory/3992-78-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral2/memory/848-84-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral2/memory/848-87-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral2/memory/848-85-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3800-8-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/3800-10-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/3800-13-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/2412-17-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2412-19-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2412-20-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2412-21-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2412-23-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1100-26-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/1100-29-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/1100-30-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/1100-31-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/1100-32-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/4620-34-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4620-36-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4620-38-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4620-39-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4584-41-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4584-43-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4584-44-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4584-45-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3800-46-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/4584-48-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2964-51-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2964-53-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2964-55-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2964-57-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/3476-60-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3476-62-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3476-63-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3476-64-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3476-65-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3992-72-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3992-74-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3992-76-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3992-75-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/848-81-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3992-78-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/848-83-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/848-84-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/848-87-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/848-85-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3800-90-0x0000000000400000-0x00000000004AE000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 03dd31fc3faca182bd4c0dec23274254.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 03dd31fc3faca182bd4c0dec23274254.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 4840 set thread context of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 1820 set thread context of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 3800 set thread context of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 set thread context of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 set thread context of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 set thread context of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 set thread context of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 set thread context of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 set thread context of 1440 3800 03dd31fc3faca182bd4c0dec23274254.exe 100 PID 3800 set thread context of 3992 3800 03dd31fc3faca182bd4c0dec23274254.exe 102 PID 3800 set thread context of 848 3800 03dd31fc3faca182bd4c0dec23274254.exe 103 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1100 03dd31fc3faca182bd4c0dec23274254.exe 1100 03dd31fc3faca182bd4c0dec23274254.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1100 03dd31fc3faca182bd4c0dec23274254.exe Token: SeDebugPrivilege 3476 03dd31fc3faca182bd4c0dec23274254.exe Token: SeRestorePrivilege 3476 03dd31fc3faca182bd4c0dec23274254.exe Token: SeBackupPrivilege 3476 03dd31fc3faca182bd4c0dec23274254.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4840 03dd31fc3faca182bd4c0dec23274254.exe 1820 03dd31fc3faca182bd4c0dec23274254.exe 3800 03dd31fc3faca182bd4c0dec23274254.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 4840 wrote to memory of 1820 4840 03dd31fc3faca182bd4c0dec23274254.exe 90 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 1820 wrote to memory of 3800 1820 03dd31fc3faca182bd4c0dec23274254.exe 91 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 2412 3800 03dd31fc3faca182bd4c0dec23274254.exe 92 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 1100 3800 03dd31fc3faca182bd4c0dec23274254.exe 93 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4620 3800 03dd31fc3faca182bd4c0dec23274254.exe 94 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 4584 3800 03dd31fc3faca182bd4c0dec23274254.exe 95 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 2964 3800 03dd31fc3faca182bd4c0dec23274254.exe 96 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99 PID 3800 wrote to memory of 3476 3800 03dd31fc3faca182bd4c0dec23274254.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe"C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe"C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe"C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\offc.dat"4⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\mess.dat"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\mail.dat"4⤵
- Accesses Microsoft Outlook accounts
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\dial.dat"4⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\chro.dat"4⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\iexp.dat"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\ptsg.dat"4⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\ffox.dat"4⤵PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\03dd31fc3faca182bd4c0dec23274254.exe/stext "C:\Users\Admin\AppData\Local\Temp\opra.dat"4⤵PID:848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
729B
MD5e79acc07c611054e1b0eeaa392f3f511
SHA1bb678c7e79e11cc32585a4bf9e037b06342e0379
SHA256511337a0af3a381fd8b71aaf46ab88f6e468b09710485a6d01240f6bc428c267
SHA512f20d41aa9046e1dcd2eeaabe056f391b4588dfe68700d4d51b4858447eed08b5631005dd9bca771127eab9be6bb790d95d77c66578a23921a3b37a08424627d0