Analysis
-
max time kernel
126s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 07:07
Static task
static1
Behavioral task
behavioral1
Sample
11bdefe9463d7d9caf317514750dc6a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11bdefe9463d7d9caf317514750dc6a2.exe
Resource
win10v2004-20231215-en
General
-
Target
11bdefe9463d7d9caf317514750dc6a2.exe
-
Size
361KB
-
MD5
11bdefe9463d7d9caf317514750dc6a2
-
SHA1
62d4f90d7fa24f9855430af2583ed7ac417c3b2f
-
SHA256
4476bbf546939c0aa04b0443d46946c54c139bbbb358b3d6111805d037fbd59f
-
SHA512
aba6060e9b334e90436acd773d126c9f640391d55761a87ea134cbc474e67df67f9ac219288e3dc056f7d72793465a59efdfe21dec7863d2bc4af85792924c9c
-
SSDEEP
6144:NKDmydY+S9m2IsM56ZyXriQtAkaY9h4JewwdhTm77IEiwJJB:SdY+kmf6Z+rjuk19KNYhTmAEiwb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 11bdefe9463d7d9caf317514750dc6a2.exe Key queried \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 11bdefe9463d7d9caf317514750dc6a2.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 11bdefe9463d7d9caf317514750dc6a2.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 whatismyip.com 13 ip-address.domaintools.com 15 ip-address.domaintools.com 16 ip-address.domaintools.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2820 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 11bdefe9463d7d9caf317514750dc6a2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2836 2188 11bdefe9463d7d9caf317514750dc6a2.exe 28 PID 2188 wrote to memory of 2836 2188 11bdefe9463d7d9caf317514750dc6a2.exe 28 PID 2188 wrote to memory of 2836 2188 11bdefe9463d7d9caf317514750dc6a2.exe 28 PID 2188 wrote to memory of 2836 2188 11bdefe9463d7d9caf317514750dc6a2.exe 28 PID 2836 wrote to memory of 2820 2836 cmd.exe 30 PID 2836 wrote to memory of 2820 2836 cmd.exe 30 PID 2836 wrote to memory of 2820 2836 cmd.exe 30 PID 2836 wrote to memory of 2820 2836 cmd.exe 30 -
outlook_win_path 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 11bdefe9463d7d9caf317514750dc6a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11bdefe9463d7d9caf317514750dc6a2.exe"C:\Users\Admin\AppData\Local\Temp\11bdefe9463d7d9caf317514750dc6a2.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2820
-
-