Analysis
-
max time kernel
6s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
2fa857766a51190a35c523d1e668c419.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2fa857766a51190a35c523d1e668c419.exe
Resource
win10v2004-20231215-en
General
-
Target
2fa857766a51190a35c523d1e668c419.exe
-
Size
597KB
-
MD5
2fa857766a51190a35c523d1e668c419
-
SHA1
a03a3e40fea2601e2b745b6d111d8b50384f1bd5
-
SHA256
32635c5f985aa62687009145f91b4523b781bea2faa94f7864d2ff16ab0a14ef
-
SHA512
3c54fd2dcfce7e412b8fe2bf328b7feb22dc2eabc24b14040255b7844280c0b4e5d9860c3e244fd90e5702b51454a406039bfd4edd245ee0f530eac4ed191556
-
SSDEEP
12288:pjxXyjFxBYSk/XE+DF7ruopsW+grfBecYSDE5JVKV6m9E1/E:pjlyZxBAXdZ75CgEcfDE5kKdE
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2508-4-0x0000000000380000-0x0000000000396000-memory.dmp family_zgrat_v1 -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 7 IoCs
resource yara_rule behavioral1/memory/2768-27-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral1/memory/2768-31-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral1/memory/2768-29-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral1/memory/2768-23-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral1/memory/2768-21-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral1/memory/2372-128-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral1/memory/2372-126-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty -
A310logger Executable 8 IoCs
resource yara_rule behavioral1/memory/2768-27-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral1/memory/2768-31-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral1/memory/2768-29-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral1/memory/2768-23-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral1/memory/2768-21-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral1/files/0x0036000000015c7b-100.dat a310logger behavioral1/memory/2372-128-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral1/memory/2372-126-0x0000000000400000-0x0000000000418000-memory.dmp a310logger -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2508 set thread context of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2252 set thread context of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2252 2fa857766a51190a35c523d1e668c419.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2252 2fa857766a51190a35c523d1e668c419.exe 2252 2fa857766a51190a35c523d1e668c419.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2508 wrote to memory of 2252 2508 2fa857766a51190a35c523d1e668c419.exe 28 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 PID 2252 wrote to memory of 2768 2252 2fa857766a51190a35c523d1e668c419.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fa857766a51190a35c523d1e668c419.exe"C:\Users\Admin\AppData\Local\Temp\2fa857766a51190a35c523d1e668c419.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\2fa857766a51190a35c523d1e668c419.exe"C:\Users\Admin\AppData\Local\Temp\2fa857766a51190a35c523d1e668c419.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:2768 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"4⤵PID:1956
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"3⤵PID:1388
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"3⤵PID:2372
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"4⤵PID:1528
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a7632027dedb229806ac3df1171a0d
SHA1f19bbd06eb66602398175af64d868fd4ed7333dc
SHA256a9e33dacc1bddf8d1e860361b5ca6b985850c68fa8403290f947bd3e5f6e2544
SHA512f63e3a89e69eab9fa5819762db0e0a7d14d1ed05009b0fa71d695ea5e64277f655c1356d9faaebaf2a49b6f7182d5ffa310b793175af7cbe644e814787128284
-
Filesize
30KB
MD5c59b19dcf7725b5c2e3e148879a0f8ce
SHA1e83439d0edc1a4580cee5743bbe8091380015f14
SHA25653060476a1b8ae0812efdf4740d4de144ab47eba200320f13657d9ed44c3d041
SHA512680106501fcf309bcbb113ed843dbd7685a0b674cc05ac85e6b0d2ab3b0dc2c835f781fe13d2ebc775496ba6da50d7ae464821bb63c13e5ef55a501d8829725e
-
Filesize
39KB
MD534325be3507824570b2b8f4219a6e121
SHA1b788bfeda0d4d8cbcc68b011f3dec9d6758dc4f0
SHA25622f6ca482d117df1cd1f288b5c4c72eab457a5401d2e3ed4dcca05baa444ca1e
SHA51290820b72619aa136275a5968ecaae8649bedf7c7b3dcde20b835316bd26b98b44b49f37a875b6cbf45cc42d6bcf5fbc82755331d9c546df91b5d894132dc02b5
-
Filesize
20KB
MD51bad0cbd09b05a21157d8255dc801778
SHA1ff284bba12f011b72e20d4c9537d6c455cdbf228
SHA256218073bda7a00e780704c1289d5e22ad27bb3ba11f210afa18af33a6ad5176e9
SHA5124fea56812eba1f1bba17f20d06b509e2a3b4e138562e53c230d0736d596abed4a6a3e43e26936fcd6d107924c8bba41885f34901afa4fd0d37d7e4a93c9b8533