Analysis
-
max time kernel
32s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe
Resource
win10v2004-20231215-en
General
-
Target
7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe
-
Size
1.4MB
-
MD5
7e1fdba02d3b4f8ad6b0dce97d96ea6d
-
SHA1
f48ae1452b6d9ee778eca7789eedb01c2833a9d4
-
SHA256
cffb6fad2233cb1d9bf78556fc31346f21ab57c57969ab2bbeaffcec9cd81fe7
-
SHA512
7b6651ecd0f9c2847291d8614ad4d37a78423d81573caccd97d3181f1ff18c951aceae9aa331bc766f15a8cfd8e8cca6afc5e21e922ecceefa27668d7e527d3c
-
SSDEEP
24576:Ahik9Fe48J//s8kUfpinWpzjc540i+knpJmJ4e52AeFJHFm9:aup9/s8kUEWcVi+A7AePE9
Malware Config
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2292-30-0x0000000000400000-0x000000000041D000-memory.dmp MailPassView behavioral1/memory/2292-28-0x0000000000400000-0x000000000041D000-memory.dmp MailPassView behavioral1/memory/2292-31-0x0000000000400000-0x000000000041D000-memory.dmp MailPassView -
Nirsoft 22 IoCs
resource yara_rule behavioral1/memory/2144-13-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2292-30-0x0000000000400000-0x000000000041D000-memory.dmp Nirsoft behavioral1/memory/2292-28-0x0000000000400000-0x000000000041D000-memory.dmp Nirsoft behavioral1/memory/2144-15-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2144-14-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2144-12-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2144-11-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2644-46-0x0000000000400000-0x0000000000416000-memory.dmp Nirsoft behavioral1/memory/2152-62-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/2152-61-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/2152-60-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/2644-47-0x0000000000400000-0x0000000000416000-memory.dmp Nirsoft behavioral1/memory/2644-45-0x0000000000400000-0x0000000000416000-memory.dmp Nirsoft behavioral1/memory/2644-44-0x0000000000400000-0x0000000000416000-memory.dmp Nirsoft behavioral1/memory/2292-31-0x0000000000400000-0x000000000041D000-memory.dmp Nirsoft behavioral1/memory/2488-84-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/1840-117-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/1728-136-0x0000000000400000-0x000000000041A000-memory.dmp Nirsoft behavioral1/memory/1840-120-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/2852-103-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/2852-101-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/2488-81-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
pid Process 2132 temp.exe -
Loads dropped DLL 2 IoCs
pid Process 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2144-13-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2292-27-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2292-25-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2292-30-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2292-29-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2292-28-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2292-21-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2292-19-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2144-15-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2144-14-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2144-12-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2144-11-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2144-10-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2144-8-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2144-4-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2144-2-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2644-46-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2152-62-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2152-61-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2152-60-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2152-59-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2152-57-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2152-53-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2152-51-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2644-47-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2644-45-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2644-44-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2644-43-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2644-41-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2644-37-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2644-35-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2292-31-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2488-77-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/2488-84-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1840-117-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/1728-136-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1840-120-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2488-81-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/2488-69-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3052 set thread context of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 set thread context of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 set thread context of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 set thread context of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 set thread context of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 set thread context of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 set thread context of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 set thread context of 1728 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 37 PID 3052 set thread context of 1628 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2144 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe Token: SeDebugPrivilege 2644 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe Token: SeDebugPrivilege 1840 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2144 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 17 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2292 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 16 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2644 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 31 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2152 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 30 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2488 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 32 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 2852 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 33 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1840 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 34 PID 3052 wrote to memory of 1728 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 37 PID 3052 wrote to memory of 1728 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 37 PID 3052 wrote to memory of 1728 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 37 PID 3052 wrote to memory of 1728 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 37 PID 3052 wrote to memory of 1728 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 37 PID 3052 wrote to memory of 1728 3052 7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe"C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Accesses Microsoft Outlook accounts
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe"C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe"2⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\7e1fdba02d3b4f8ad6b0dce97d96ea6d.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"2⤵
- Executes dropped EXE
PID:2132
-