Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
ddfc57b8fd3e5e0f81dee8ead0e38518.exe
Resource
win7-20240221-en
General
-
Target
ddfc57b8fd3e5e0f81dee8ead0e38518.exe
-
Size
964KB
-
MD5
ddfc57b8fd3e5e0f81dee8ead0e38518
-
SHA1
ca35000ed1844f30e932d8903633e4beb519967f
-
SHA256
c1cd0692836798f5cb7e9335f4547a2650b77cf456193cbe7e384906a20c0603
-
SHA512
083bc3c27ddefbf541b91ef71728a2e3831563be171f4d7ca63dea9e04357533d2bf345c7ccdced551cc8220826d79f894b43f1de2ae8d3fd17a39c1bf838fcc
-
SSDEEP
12288:MeTvtJpA3OXv2BFokZRhXQ5TZaRPlPO0E09wrp:MeDtJSO/2ffxA5TZaP20Eh9
Malware Config
Signatures
-
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1020-12-0x0000000000400000-0x0000000000488000-memory.dmp MailPassView behavioral2/memory/3648-23-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3648-25-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3648-26-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3648-28-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 5 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/1020-12-0x0000000000400000-0x0000000000488000-memory.dmp WebBrowserPassView behavioral2/memory/1816-29-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/1816-31-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/1816-36-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/1816-40-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 9 IoCs
Processes:
resource yara_rule behavioral2/memory/1020-12-0x0000000000400000-0x0000000000488000-memory.dmp Nirsoft behavioral2/memory/3648-23-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3648-25-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3648-26-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3648-28-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/1816-29-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/1816-31-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/1816-36-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/1816-40-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 81 whatismyipaddress.com 83 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ddfc57b8fd3e5e0f81dee8ead0e38518.exeddfc57b8fd3e5e0f81dee8ead0e38518.exedescription pid process target process PID 508 set thread context of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 1020 set thread context of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 set thread context of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
ddfc57b8fd3e5e0f81dee8ead0e38518.exevbc.exeddfc57b8fd3e5e0f81dee8ead0e38518.exepid process 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe 1816 vbc.exe 1816 vbc.exe 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ddfc57b8fd3e5e0f81dee8ead0e38518.exeddfc57b8fd3e5e0f81dee8ead0e38518.exedescription pid process Token: SeDebugPrivilege 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe Token: SeDebugPrivilege 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
ddfc57b8fd3e5e0f81dee8ead0e38518.exeddfc57b8fd3e5e0f81dee8ead0e38518.exedescription pid process target process PID 508 wrote to memory of 2388 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 2388 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 2388 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 508 wrote to memory of 1020 508 ddfc57b8fd3e5e0f81dee8ead0e38518.exe ddfc57b8fd3e5e0f81dee8ead0e38518.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 3648 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe PID 1020 wrote to memory of 1816 1020 ddfc57b8fd3e5e0f81dee8ead0e38518.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddfc57b8fd3e5e0f81dee8ead0e38518.exe"C:\Users\Admin\AppData\Local\Temp\ddfc57b8fd3e5e0f81dee8ead0e38518.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\ddfc57b8fd3e5e0f81dee8ead0e38518.exe"C:\Users\Admin\AppData\Local\Temp\ddfc57b8fd3e5e0f81dee8ead0e38518.exe"2⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\ddfc57b8fd3e5e0f81dee8ead0e38518.exe"C:\Users\Admin\AppData\Local\Temp\ddfc57b8fd3e5e0f81dee8ead0e38518.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:3648
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ddfc57b8fd3e5e0f81dee8ead0e38518.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196