Analysis
-
max time kernel
134s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
firsttest.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
firsttest.exe
Resource
win10v2004-20231222-en
General
-
Target
firsttest.exe
-
Size
1.5MB
-
MD5
8bb338177a68851428cb952cc157ca37
-
SHA1
da2e10427081f89012a16d72275da0561ee425d8
-
SHA256
5d9fd19eb2028c1d5433c40286bd724ccaf3b0eda9bd510bef9537e228a47d82
-
SHA512
37785e7fe0c41e892661fdf4344c82b289f6663d0659f4ca14952101ddc1d561796d7bda3cc4bacce6747063de7c8aecb1cad08f65031bf6a8b218ba8d0b2795
-
SSDEEP
24576:kEk0OwQ69WHrXz3gDYEzfbQAT5zi9m02NdJW9SUDmsXU7V2pQGTmMp/1q/h8TuD:1YEzfbf9i9m0ws9/msXQ8xt/uD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation firsttest.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 firsttest.exe Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 firsttest.exe Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 firsttest.exe Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 firsttest.exe Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 firsttest.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 7 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 552 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3552 firsttest.exe 3552 firsttest.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3552 wrote to memory of 2884 3552 firsttest.exe 104 PID 3552 wrote to memory of 2884 3552 firsttest.exe 104 PID 2884 wrote to memory of 552 2884 cmd.exe 102 PID 2884 wrote to memory of 552 2884 cmd.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 firsttest.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 firsttest.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\firsttest.exe"C:\Users\Admin\AppData\Local\Temp\firsttest.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3552 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\firsttest.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2884
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Runs ping.exe
PID:552