Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
4f8449690bfc77f63c4977a3b7cb2255.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f8449690bfc77f63c4977a3b7cb2255.exe
Resource
win10v2004-20231222-en
General
-
Target
4f8449690bfc77f63c4977a3b7cb2255.exe
-
Size
113KB
-
MD5
4f8449690bfc77f63c4977a3b7cb2255
-
SHA1
436b32cb7109dc10277530223ae7020b15f89cc6
-
SHA256
0e0d744c48f63b6dfff5214aff595a6a2486a1cfe80bb97b7399ac70f3f6e61a
-
SHA512
c44878ce966a54553c65a58a6c27dd6674c7bbdeb067d2d1d77cf55655b3ee00ddb60f31bb12c8096df6204fde88a02afde304719864740cb928721b16000fb9
-
SSDEEP
1536:jbjNiQHzi+l8gkeGS7BZpbMqMMlMSkpStSYcx8tq4g3QYZVOozp:XUQHu+l8gk8jMRrAkKU4QfOAp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1528 Copy of pinch.exe [èñõîäíûé].exe -
Loads dropped DLL 2 IoCs
pid Process 2432 4f8449690bfc77f63c4977a3b7cb2255.exe 2432 4f8449690bfc77f63c4977a3b7cb2255.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Copy of pinch.exe [èñõîäíûé].exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1528 Copy of pinch.exe [èñõîäíûé].exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1528 Copy of pinch.exe [èñõîäíûé].exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1528 2432 4f8449690bfc77f63c4977a3b7cb2255.exe 28 PID 2432 wrote to memory of 1528 2432 4f8449690bfc77f63c4977a3b7cb2255.exe 28 PID 2432 wrote to memory of 1528 2432 4f8449690bfc77f63c4977a3b7cb2255.exe 28 PID 2432 wrote to memory of 1528 2432 4f8449690bfc77f63c4977a3b7cb2255.exe 28 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Copy of pinch.exe [èñõîäíûé].exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f8449690bfc77f63c4977a3b7cb2255.exe"C:\Users\Admin\AppData\Local\Temp\4f8449690bfc77f63c4977a3b7cb2255.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Copy of pinch.exe [èñõîäíûé].exe"C:\Users\Admin\AppData\Local\Temp\Copy of pinch.exe [èñõîäíûé].exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5ecafbfae785111effbd8a59674da5ba6
SHA12a77c611777332869d28fec4ed788eda9fe52984
SHA256198c57f878b61bd39c6ae3fc5391d35c2b5ec13ab1f6ded1b154cbc749c9d0bb
SHA5124a55290f086e8bdf8cfeecc337fd2c4a1e19ceaa8a4fdaee72b92cdc4d17ce5f739b71c11d20345a46eaa124f5c4afd691922fa6841ff38aaaa5c941c4e5ffa6