Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2024 21:13

General

  • Target

    VirusShare_c521f79249320c77b5b20007f871fbb1.exe

  • Size

    951KB

  • MD5

    c521f79249320c77b5b20007f871fbb1

  • SHA1

    8b772e27c77fd4880b79fe8466bff21e21e1aa2a

  • SHA256

    2cd607fb44480b61c90e5107a3131231936c99a7b766dbed4df4c6fed325ae0f

  • SHA512

    f471c23576f61e2066e09c44ae3beab374153fdafebfb6cc03e140942c15d3fa273394848dd3a4ba0bd07c7883b678d0d2dcbc1be1ea5a381882b101e55107bb

  • SSDEEP

    24576:9Sr69b1sIzdkdUDuCppG/HNs2HRT3s4ni4gSUf4:B9b1xdySu84lsMRzVniLw

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    webmail.congtydirect.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Fest@@21

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 12 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 12 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 12 IoCs
  • NirSoft MailPassView 12 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 12 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 16 IoCs
  • UPX dump on OEP (original entry point) 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_c521f79249320c77b5b20007f871fbb1.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_c521f79249320c77b5b20007f871fbb1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BFile_1.pdf"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2020
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          4⤵
          • Accesses Microsoft Outlook accounts
          PID:1828
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          4⤵
            PID:1196

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\BFile_1.pdf

      Filesize

      76KB

      MD5

      a044a4eaea50ac33f65fd614f4b78509

      SHA1

      f4c1d9a86ee7769492293508f650f67dc3c523f7

      SHA256

      8f9c44049129703f3d6d3beeff6ac8d576df276a56e8f7f85c86beda912ed8c4

      SHA512

      9fbeae185958d0c7868bc21fd08220cc8e1f6aaa6cea14ffbb257a93355ba043e294be25ae40c8f80d75563bdd1f9cec3f29afa944b3cac11664ec4b066822d3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.ex_

      Filesize

      749KB

      MD5

      aa9da8f4f5e434d8449c17efccebef5e

      SHA1

      99487070bb0da9e0c2df138b111e9bebc2a271f2

      SHA256

      16b6bdc384d7b4821d541eb40f1be8c3ca2b027b9a329e77eb4c13800b3e8ec2

      SHA512

      768fb0d93c91ad868f7b2cfc0fc67ce2e20293e40ec1e4216bb805232a2f02cdfd3ec225c29c40bed6c4f505aa35b788f5291661b99d2773c24d395c825ef0cb

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe

      Filesize

      104KB

      MD5

      42ccd69a3be9618d329de0ea0fde3a81

      SHA1

      47e9897f303496eb9cd5883f9cdb283b6eee65d3

      SHA256

      14137fcc8697e967b251fd0fafbdf79af8db4c1a67f2eafe53756e3ad80a9bef

      SHA512

      33d95b20ce606441c89dbc575c8e884196a19db056ffd9d54a5e0c57f3928b0d064b6270e4abf033046606e0456156faba3f3a8e6a353e924a7461e61e46bfae

    • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      0fba95c4639f3345f5458039ebb8ac38

      SHA1

      2eba13a0b9475d62ea00207196ea6442b6058555

      SHA256

      7b6ae768ec682a27364b9a8d86c8d7f91bc459daaf6a42df6423633abeb1870c

      SHA512

      6ea238f1c783f35811533d76967ce6b3120e72c03e19eb616965259745b025080dd7f6f727f251c6b13aff252953aea5e524e7ef0ab1198e24257fa19881c927

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe

      Filesize

      140KB

      MD5

      bc9932d562808f046db8cf2d225b317e

      SHA1

      50827e282cb74b846b8ef79ccd3f5887e3a941f2

      SHA256

      49a50d91166a62cb0c1454d015af0b5b98ea86702c9e88c21f6e5775517571b7

      SHA512

      d46153b9d0260a076fd6247de14325b2f76d7537139677af927427fab23852258634b525a1e3e31e19456a04a5c58527ac351f44b475c2eb984294b30b0efa22

    • memory/1196-86-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1196-88-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1196-91-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1196-84-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1828-61-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1828-83-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1828-65-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1828-63-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2220-49-0x0000000000190000-0x00000000001EC000-memory.dmp

      Filesize

      368KB

    • memory/2220-6-0x0000000000190000-0x00000000001EC000-memory.dmp

      Filesize

      368KB

    • memory/2220-11-0x0000000000190000-0x00000000001EC000-memory.dmp

      Filesize

      368KB

    • memory/2744-52-0x0000000000230000-0x000000000023D000-memory.dmp

      Filesize

      52KB

    • memory/2744-41-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2744-22-0x0000000000250000-0x0000000000255000-memory.dmp

      Filesize

      20KB

    • memory/2744-27-0x0000000000370000-0x00000000003CC000-memory.dmp

      Filesize

      368KB

    • memory/2844-31-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-50-0x0000000074210000-0x00000000747BB000-memory.dmp

      Filesize

      5.7MB

    • memory/2844-58-0x00000000002A0000-0x00000000002E0000-memory.dmp

      Filesize

      256KB

    • memory/2844-45-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-60-0x0000000074210000-0x00000000747BB000-memory.dmp

      Filesize

      5.7MB

    • memory/2844-43-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-38-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-36-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2844-35-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-34-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-33-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-32-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-29-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-26-0x0000000000400000-0x0000000004B18000-memory.dmp

      Filesize

      71.1MB

    • memory/2844-25-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2844-92-0x00000000002A0000-0x00000000002E0000-memory.dmp

      Filesize

      256KB