Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
558d04f0ef9feb982fddc94a8564c1d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
558d04f0ef9feb982fddc94a8564c1d4.exe
Resource
win10v2004-20231215-en
General
-
Target
558d04f0ef9feb982fddc94a8564c1d4.exe
-
Size
728KB
-
MD5
558d04f0ef9feb982fddc94a8564c1d4
-
SHA1
d129efc760c4fd279701d9b72f18f05f03a3dd79
-
SHA256
f68687dec3d4c27ef25a5f160df49445a8cfbd1881fb7613a935bdd4cb302895
-
SHA512
84f95a6c4d3c232b4b3e6e5771d5a78221c9f4cbee0d095e1fd4fd4e54554eb3f9c16eb3a1aa48bf5770fcd0156cbe06c9de338aefe48bfb8b86d7c60b28cd5a
-
SSDEEP
12288:+z9/32XvY6CD6zzXGytE0/OJKG+UlIKfJuUKo1nWjhStiSbUccDJIwsrom+f:u9vesuzzXGyO0/OJKiICuUKtYcwUccH5
Malware Config
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2680-56-0x0000000000400000-0x0000000000419000-memory.dmp MailPassView behavioral1/memory/2680-52-0x0000000000400000-0x0000000000419000-memory.dmp MailPassView -
Nirsoft 5 IoCs
resource yara_rule behavioral1/memory/1444-30-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1444-31-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1444-26-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2680-56-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/2680-52-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft -
Deletes itself 1 IoCs
pid Process 1484 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1988-113-0x0000000010000000-0x000000001001F000-memory.dmp upx behavioral1/memory/1988-124-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 558d04f0ef9feb982fddc94a8564c1d4.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1988 set thread context of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 set thread context of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 set thread context of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 set thread context of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1444 558d04f0ef9feb982fddc94a8564c1d4.exe Token: SeDebugPrivilege 2596 558d04f0ef9feb982fddc94a8564c1d4.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 1444 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 14 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2680 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 27 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2664 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 30 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 2596 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 31 PID 1988 wrote to memory of 1484 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 34 PID 1988 wrote to memory of 1484 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 34 PID 1988 wrote to memory of 1484 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 34 PID 1988 wrote to memory of 1484 1988 558d04f0ef9feb982fddc94a8564c1d4.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\558d04f0ef9feb982fddc94a8564c1d4.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
C:\Users\Admin\AppData\Local\Temp\558d04f0ef9feb982fddc94a8564c1d4.exe"C:\Users\Admin\AppData\Local\Temp\558d04f0ef9feb982fddc94a8564c1d4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\558d04f0ef9feb982fddc94a8564c1d4.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Accesses Microsoft Outlook accounts
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\558d04f0ef9feb982fddc94a8564c1d4.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\558d04f0ef9feb982fddc94a8564c1d4.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\558D04~1.EXE >> NUL2⤵
- Deletes itself
PID:1484
-