Resubmissions
10/04/2024, 02:53
240410-ddcrcsff3z 710/04/2024, 02:53
240410-ddb5tscc79 710/04/2024, 02:53
240410-ddbt3aff3w 710/04/2024, 02:53
240410-ddbjasff3v 714/10/2023, 10:48
231014-mwhvrsce7y 7Analysis
-
max time kernel
316s -
max time network
1714s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/04/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win11-20240221-en
General
-
Target
q9cee706b7cbe32e33ace42b3.exe
-
Size
285KB
-
MD5
ecabf4d6692cd5ec991817f3b4a3170a
-
SHA1
7aa0c00f7d624ea1fc99496f28ba7787fd38e680
-
SHA256
756478606cced2d82be4625672faf105fdc9ab901757740a619b70b0bf102331
-
SHA512
23e213b010f3073d14ec918d80b3e519a3d59133b1d3798f4567337e6c689d500bb2ea10fb394de03d2e57b8a377402132f77466dd33410136241d8d1ded92ca
-
SSDEEP
3072:ix9JdT0pDj9yVfAK97GCkCYv+dRO7ZrLciXpDG/CdVWh6nt0lhLMgE/wV2p7vvSo:lSAY7GxZ8/ZQgEwV/ydcuCDY9bbzR38
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4652 q9cee706b7cbe32e33ace42b3.exe 3616 q9cee706b7cbe32e33ace42b3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4052 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2996 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3580 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 4652 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 3616 q9cee706b7cbe32e33ace42b3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3580 wrote to memory of 4108 3580 q9cee706b7cbe32e33ace42b3.exe 74 PID 3580 wrote to memory of 4108 3580 q9cee706b7cbe32e33ace42b3.exe 74 PID 4108 wrote to memory of 1232 4108 cmd.exe 76 PID 4108 wrote to memory of 1232 4108 cmd.exe 76 PID 4108 wrote to memory of 2996 4108 cmd.exe 77 PID 4108 wrote to memory of 2996 4108 cmd.exe 77 PID 4108 wrote to memory of 4052 4108 cmd.exe 78 PID 4108 wrote to memory of 4052 4108 cmd.exe 78 PID 4108 wrote to memory of 4652 4108 cmd.exe 79 PID 4108 wrote to memory of 4652 4108 cmd.exe 79 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\q9cee706b7cbe32e33ace42b3.exe"C:\Users\Admin\AppData\Local\Temp\q9cee706b7cbe32e33ace42b3.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "q9cee706b7cbe32e33ace42b3" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\q9cee706b7cbe32e33ace42b3.exe" &&START "" "C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1232
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2996
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "q9cee706b7cbe32e33ace42b3" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4052
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe"C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847B
MD5a908a7c6e93edeb3e400780b6fe62dde
SHA136e2b437f41443f6b41b45b35a0f97b2cd94123d
SHA256cae801b0499949178298c1c1a083f7c0febb971d262be9c9588437af66c76ef0
SHA512deb437dcb1440d37bcd61dfa43be05fd01856a1d1e59aa5b2dfa142e9ae584b0577eea024edb99d8e74e3a1b606bb7ae3b4f9cd8eb30813e67dda678b9319cbe
-
Filesize
285KB
MD5ecabf4d6692cd5ec991817f3b4a3170a
SHA17aa0c00f7d624ea1fc99496f28ba7787fd38e680
SHA256756478606cced2d82be4625672faf105fdc9ab901757740a619b70b0bf102331
SHA51223e213b010f3073d14ec918d80b3e519a3d59133b1d3798f4567337e6c689d500bb2ea10fb394de03d2e57b8a377402132f77466dd33410136241d8d1ded92ca
-
Filesize
4B
MD5977b33ace8251dd9bee913e7ba56eebc
SHA1984f1c55f733eb93231511e77e712caad0e15516
SHA256bdf67436ad5405970b118777ad86d8f66005acc987adab47d277eb9f402551da
SHA512c073de3247b8bda2ed3bf7752cfd12f9617c94188cbaf6084fb9e2c3fcb0f54521f4edf101ddace4741f533d721b86b6ef336cc6923c4a40f2062da86faddbd7