Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2024 19:37

General

  • Target

    70642326a2a201e646770cc9381ccd2a.exe

  • Size

    58KB

  • MD5

    70642326a2a201e646770cc9381ccd2a

  • SHA1

    7df304ea9930e9ecbf920747766a7d4b36e08273

  • SHA256

    7232884fa26e8adade78a2da2f5fe45f3d5d21fa904acb12f0ecda78e0b0fbe5

  • SHA512

    3935d782f46361cf3c978b4b5cf816398c09747316261bdfc2097fbd35f39d4611dbac64170d0d70596bb6e249306c3d2c629c01f52c412260c87ba4102cc326

  • SSDEEP

    768:P0PFonppZMOaXDk0Tj6xP2R99zTb/Vegp+xZAj8rdBlQceElzUDNTiOQINmgC61C:fCOb0Tj6MR9BbkI+xZSudBjpOjQIoIYn

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70642326a2a201e646770cc9381ccd2a.exe
    "C:\Users\Admin\AppData\Local\Temp\70642326a2a201e646770cc9381ccd2a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\fsg.exe
      "C:\Users\Admin\AppData\Local\Temp\fsg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2772
    • C:\Users\Admin\AppData\Local\Temp\pinch6.exe
      "C:\Users\Admin\AppData\Local\Temp\pinch6.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_win_path
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\fsg.exe

    Filesize

    21KB

    MD5

    00bd8f44c6176394caf6c018c23ea71b

    SHA1

    bea81ea37908bead6bac9391891e234693fa1341

    SHA256

    7cd037fe5ef0d4531cb934b39570014718d2a60c01ab7a8cc74f466b6d0db417

    SHA512

    16810ec90f338eeabee9283fbe934f3b6b9cddb0161469bec644f61fce9ec63064820e9ed96fcacf6ec8683d1e6ff7c7b1fb700395a088b5a17243acdf236e02

  • \Users\Admin\AppData\Local\Temp\pinch6.exe

    Filesize

    29KB

    MD5

    84a6dad846d348759fa59c8b55e9d8f3

    SHA1

    593cad74dcbaef780d76c97bc5e3be96acbeea1d

    SHA256

    58883f9da6944e993bb39885e04137152cc7f510ed8c3e09b25bcd820bdcf675

    SHA512

    4af0cff7e950c86d9133b22ad12eca27a3ef05c256e28c762f83d1dae69323dfbd0c68e0e89ad9d20f2205cdf6a5743e07345eef5c6e0abf4471d828b26ef1e9

  • memory/2724-18-0x0000000013140000-0x000000001317D000-memory.dmp

    Filesize

    244KB

  • memory/2724-19-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2724-33-0x0000000013140000-0x000000001317D000-memory.dmp

    Filesize

    244KB

  • memory/2772-21-0x0000000004190000-0x0000000004192000-memory.dmp

    Filesize

    8KB

  • memory/2772-20-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB

  • memory/2772-27-0x0000000013140000-0x000000001317D000-memory.dmp

    Filesize

    244KB

  • memory/2772-31-0x0000000013140000-0x000000001317D000-memory.dmp

    Filesize

    244KB

  • memory/2772-32-0x0000000013140000-0x000000001317D000-memory.dmp

    Filesize

    244KB

  • memory/2772-34-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2772-36-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB