Analysis

  • max time kernel
    163s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 13:25

General

  • Target

    d2553d836a160bed1332940033420852ed6f03e3565ef623575b222506800056.exe

  • Size

    1.1MB

  • MD5

    37468b49776d5dcaf30e50fb39a398de

  • SHA1

    c049956df2e0304f1a9e625dd8e9381b9b5d6b64

  • SHA256

    d2553d836a160bed1332940033420852ed6f03e3565ef623575b222506800056

  • SHA512

    010631e045f3607150e4ec66cff29d6ea88399f438f528bb2ba2342d83a8f237c117797ad617b3694c85acfea71ee4a905f338a5720e2cd0023f499b80c123d7

  • SSDEEP

    24576:tCH4JYyZZzEIW+lwYOofx+K+0ypEnR9bQrVGMCjeaDXe5t:tCYJpjzvlxOof8pEfbQrVyKaLc

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2553d836a160bed1332940033420852ed6f03e3565ef623575b222506800056.exe
    "C:\Users\Admin\AppData\Local\Temp\d2553d836a160bed1332940033420852ed6f03e3565ef623575b222506800056.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\d2553d836a160bed1332940033420852ed6f03e3565ef623575b222506800056.exe
      C:\Users\Admin\AppData\Local\Temp\d2553d836a160bed1332940033420852ed6f03e3565ef623575b222506800056.exe
      2⤵
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Choarf.tmp

    Filesize

    148KB

    MD5

    90a1d4b55edf36fa8b4cc6974ed7d4c4

    SHA1

    aba1b8d0e05421e7df5982899f626211c3c4b5c1

    SHA256

    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

    SHA512

    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

  • C:\Users\Admin\AppData\Local\Temp\Costura\1485B29524EF63EB83DF771D39CCA767\64\sqlite.interop.dll

    Filesize

    1.7MB

    MD5

    02f50a23e31d1f21aa21ae52faf3c05a

    SHA1

    5b21234729dedfa1b456138872ef2a046b9ee86f

    SHA256

    5f0e72e1839db4aa41f560e0a68c7a95c9e1656bc2f4f4ff64803655d02e5272

    SHA512

    bc2fcca125506d9b762df4e9df24a907b9e554d857e705945ae252e7e6b50dada043ef0e69828b780ac9b569053fcf912c27a770469a80f1f6094c146afdb9b0

  • C:\Users\Admin\AppData\Local\Temp\Vuallls.tmp

    Filesize

    124KB

    MD5

    9618e15b04a4ddb39ed6c496575f6f95

    SHA1

    1c28f8750e5555776b3c80b187c5d15a443a7412

    SHA256

    a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

    SHA512

    f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

  • memory/2112-45-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-2199-0x000001FD5C540000-0x000001FD5C5BA000-memory.dmp

    Filesize

    488KB

  • memory/2112-10-0x00007FFCD1C20000-0x00007FFCD26E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2112-12-0x000001FD41710000-0x000001FD41720000-memory.dmp

    Filesize

    64KB

  • memory/2112-2204-0x000001FD5C5C0000-0x000001FD5C5E6000-memory.dmp

    Filesize

    152KB

  • memory/2112-2203-0x000001FD5C9D0000-0x000001FD5CA0A000-memory.dmp

    Filesize

    232KB

  • memory/2112-2200-0x000001FD5C960000-0x000001FD5C9CC000-memory.dmp

    Filesize

    432KB

  • memory/2112-49-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-15-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-17-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-19-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-21-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-51-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-25-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-27-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-29-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-31-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-33-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-35-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-37-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-39-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-41-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-43-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-8-0x0000000140000000-0x00000001400D0000-memory.dmp

    Filesize

    832KB

  • memory/2112-14-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-47-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-23-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-53-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-55-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-57-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-59-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-61-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-63-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-65-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-67-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-69-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-71-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-73-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-75-0x000001FD43090000-0x000001FD43194000-memory.dmp

    Filesize

    1.0MB

  • memory/2112-2192-0x000001FD431A0000-0x000001FD4323E000-memory.dmp

    Filesize

    632KB

  • memory/2112-2193-0x00007FFCD1C20000-0x00007FFCD26E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2112-2194-0x000001FD5C2D0000-0x000001FD5C4E0000-memory.dmp

    Filesize

    2.1MB

  • memory/2112-13-0x000001FD43090000-0x000001FD43198000-memory.dmp

    Filesize

    1.0MB

  • memory/4296-5-0x000001FBA5220000-0x000001FBA5316000-memory.dmp

    Filesize

    984KB

  • memory/4296-4-0x000001FBA5120000-0x000001FBA5216000-memory.dmp

    Filesize

    984KB

  • memory/4296-3-0x000001FBA4F30000-0x000001FBA503E000-memory.dmp

    Filesize

    1.1MB

  • memory/4296-2-0x000001FBA4F20000-0x000001FBA4F30000-memory.dmp

    Filesize

    64KB

  • memory/4296-1-0x00007FFCD1C20000-0x00007FFCD26E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4296-0-0x000001FB8A740000-0x000001FB8A862000-memory.dmp

    Filesize

    1.1MB

  • memory/4296-6-0x000001FB8C510000-0x000001FB8C55C000-memory.dmp

    Filesize

    304KB

  • memory/4296-7-0x00007FFCD1C20000-0x00007FFCD26E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4296-11-0x00007FFCD1C20000-0x00007FFCD26E1000-memory.dmp

    Filesize

    10.8MB