Resubmissions
10-04-2024 02:49
240410-da1n1sfe7v 1010-04-2024 02:49
240410-daz3gscc34 1010-04-2024 02:48
240410-dazfyscc32 1010-04-2024 02:48
240410-dayvesfe7s 1014-10-2023 03:45
231014-ea62gage69 10Analysis
-
max time kernel
315s -
max time network
1160s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2024 02:49
Behavioral task
behavioral1
Sample
B9a5797cb584014f3fede.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
B9a5797cb584014f3fede.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
B9a5797cb584014f3fede.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
B9a5797cb584014f3fede.exe
Resource
win11-20240221-en
General
-
Target
B9a5797cb584014f3fede.exe
-
Size
530KB
-
MD5
862e7aeb18ba5892f51b5712a213a614
-
SHA1
99d86e4247f52c3ea9b2bb476af66dfc7707fa8d
-
SHA256
44eca198c64197c511441f644895afd6a2777c28bcb6a376d4d4623b030ced31
-
SHA512
678fc8fb5dc887f41db90e6341229ce35c830ffac4cbb91ea669ab5e8bc849bae05c15909ae62e4dfd3a249bb2ff062eaa0e256989fe203863db0396c60ec713
-
SSDEEP
6144:XHClm6SWPoK5Z0EwVSmRPQd/t/a2zDGVPJXvnzZjDJHb571Kjn1929XDccHd8JyO:XHCnZxb88RatpvnzZjDv7oj19yTNTY
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6176004110:AAFKA5be4dMwA848HWxzYIzrzzOGIHMOJGc/sendMessage?chat_id=615133582
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5100 B9a5797cb584014f3fede.exe 3480 B9a5797cb584014f3fede.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4284 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4656 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4508 B9a5797cb584014f3fede.exe Token: SeDebugPrivilege 5100 B9a5797cb584014f3fede.exe Token: SeDebugPrivilege 3480 B9a5797cb584014f3fede.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4508 wrote to memory of 3740 4508 B9a5797cb584014f3fede.exe 72 PID 4508 wrote to memory of 3740 4508 B9a5797cb584014f3fede.exe 72 PID 3740 wrote to memory of 2168 3740 cmd.exe 74 PID 3740 wrote to memory of 2168 3740 cmd.exe 74 PID 3740 wrote to memory of 4656 3740 cmd.exe 75 PID 3740 wrote to memory of 4656 3740 cmd.exe 75 PID 3740 wrote to memory of 4284 3740 cmd.exe 76 PID 3740 wrote to memory of 4284 3740 cmd.exe 76 PID 3740 wrote to memory of 5100 3740 cmd.exe 77 PID 3740 wrote to memory of 5100 3740 cmd.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2768987046-1485460554-1347040953-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 B9a5797cb584014f3fede.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\B9a5797cb584014f3fede.exe"C:\Users\Admin\AppData\Local\Temp\B9a5797cb584014f3fede.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "B9a5797cb584014f3fede" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\B9a5797cb584014f3fede.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\B9a5797cb584014f3fede.exe" &&START "" "C:\Users\Admin\AppData\Local\Nvidia\B9a5797cb584014f3fede.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2168
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4656
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "B9a5797cb584014f3fede" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\B9a5797cb584014f3fede.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4284
-
-
C:\Users\Admin\AppData\Local\Nvidia\B9a5797cb584014f3fede.exe"C:\Users\Admin\AppData\Local\Nvidia\B9a5797cb584014f3fede.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Nvidia\B9a5797cb584014f3fede.exeC:\Users\Admin\AppData\Local\Nvidia\B9a5797cb584014f3fede.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847B
MD5a908a7c6e93edeb3e400780b6fe62dde
SHA136e2b437f41443f6b41b45b35a0f97b2cd94123d
SHA256cae801b0499949178298c1c1a083f7c0febb971d262be9c9588437af66c76ef0
SHA512deb437dcb1440d37bcd61dfa43be05fd01856a1d1e59aa5b2dfa142e9ae584b0577eea024edb99d8e74e3a1b606bb7ae3b4f9cd8eb30813e67dda678b9319cbe
-
Filesize
530KB
MD5862e7aeb18ba5892f51b5712a213a614
SHA199d86e4247f52c3ea9b2bb476af66dfc7707fa8d
SHA25644eca198c64197c511441f644895afd6a2777c28bcb6a376d4d4623b030ced31
SHA512678fc8fb5dc887f41db90e6341229ce35c830ffac4cbb91ea669ab5e8bc849bae05c15909ae62e4dfd3a249bb2ff062eaa0e256989fe203863db0396c60ec713
-
Filesize
4B
MD58fdd149fcaa7058caccc9c4ad5b0d89a
SHA1fac4199dca4b2ffef7b038c03c3416909c34d7d1
SHA256b6cbf3829f323ff95219b019c64797845ad48a594f70b8dfc63ceaa48b6353e2
SHA51261dfa25cc036697f426d10d1364f9d436daed3c900b1444ce497105db7d3e9dfeaeddc251bce41ed4bb13503d564c79c0beb5f324f1f3c4c02862a17369e6f68