Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
Specification and shematic Diagram.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Specification and shematic Diagram.exe
Resource
win10v2004-20240508-en
General
-
Target
Specification and shematic Diagram.exe
-
Size
1.4MB
-
MD5
6d8d586a1feda0d474f0d3c6efbdd706
-
SHA1
a66fc9adce64f992d7a0093d8e8c78b647ac2220
-
SHA256
d69d517b51057301a5b0e44b6ecd8dceb2c6e9f6ba9db39a002d9078169d69d5
-
SHA512
8de88c81690c38e3af5fdbecc53dc9aa042ad38f7bf60c2d7c3906e98210bf5c1a954aca861175e78fe12db4909fc16cc9f54cb33b6923c9b57975b6bf5d8829
-
SSDEEP
24576:eUfUDtdfFQ0QPEhyxv4+gR9P+S2f8dQWdY7Dx1EAhd:eaUujPKy5q9+SvQWO7wA
Malware Config
Signatures
-
NirSoft MailPassView 6 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1784-13-0x0000000000F00000-0x0000000001F00000-memory.dmp MailPassView behavioral2/memory/1784-15-0x0000000000F00000-0x0000000000F88000-memory.dmp MailPassView behavioral2/memory/3108-25-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3108-26-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3108-28-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3108-30-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 6 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/1784-13-0x0000000000F00000-0x0000000001F00000-memory.dmp WebBrowserPassView behavioral2/memory/1784-15-0x0000000000F00000-0x0000000000F88000-memory.dmp WebBrowserPassView behavioral2/memory/3264-31-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/3264-34-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/3264-32-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/3264-41-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 10 IoCs
Processes:
resource yara_rule behavioral2/memory/1784-13-0x0000000000F00000-0x0000000001F00000-memory.dmp Nirsoft behavioral2/memory/1784-15-0x0000000000F00000-0x0000000000F88000-memory.dmp Nirsoft behavioral2/memory/3108-25-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3108-26-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3108-28-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3108-30-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3264-31-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/3264-34-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/3264-32-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/3264-41-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
Processes:
wgfpulfx.exepid Process 2476 wgfpulfx.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Specification and shematic Diagram.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Specification and shematic Diagram.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 whatismyipaddress.com 35 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
wgfpulfx.exeRegSvcs.exedescription pid Process procid_target PID 2476 set thread context of 1784 2476 wgfpulfx.exe 99 PID 1784 set thread context of 3108 1784 RegSvcs.exe 102 PID 1784 set thread context of 3264 1784 RegSvcs.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
wgfpulfx.exeRegSvcs.exevbc.exepid Process 2476 wgfpulfx.exe 2476 wgfpulfx.exe 2476 wgfpulfx.exe 2476 wgfpulfx.exe 2476 wgfpulfx.exe 2476 wgfpulfx.exe 1784 RegSvcs.exe 1784 RegSvcs.exe 1784 RegSvcs.exe 1784 RegSvcs.exe 3264 vbc.exe 3264 vbc.exe 1784 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wgfpulfx.exeRegSvcs.exedescription pid Process Token: 33 2476 wgfpulfx.exe Token: SeIncBasePriorityPrivilege 2476 wgfpulfx.exe Token: SeDebugPrivilege 1784 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid Process 1784 RegSvcs.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
Specification and shematic Diagram.exewgfpulfx.execmd.exeRegSvcs.exedescription pid Process procid_target PID 3576 wrote to memory of 2476 3576 Specification and shematic Diagram.exe 83 PID 3576 wrote to memory of 2476 3576 Specification and shematic Diagram.exe 83 PID 3576 wrote to memory of 2476 3576 Specification and shematic Diagram.exe 83 PID 2476 wrote to memory of 4376 2476 wgfpulfx.exe 97 PID 2476 wrote to memory of 4376 2476 wgfpulfx.exe 97 PID 2476 wrote to memory of 4376 2476 wgfpulfx.exe 97 PID 2476 wrote to memory of 1784 2476 wgfpulfx.exe 99 PID 2476 wrote to memory of 1784 2476 wgfpulfx.exe 99 PID 2476 wrote to memory of 1784 2476 wgfpulfx.exe 99 PID 4376 wrote to memory of 2496 4376 cmd.exe 100 PID 4376 wrote to memory of 2496 4376 cmd.exe 100 PID 4376 wrote to memory of 2496 4376 cmd.exe 100 PID 2476 wrote to memory of 1784 2476 wgfpulfx.exe 99 PID 2476 wrote to memory of 1784 2476 wgfpulfx.exe 99 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3108 1784 RegSvcs.exe 102 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104 PID 1784 wrote to memory of 3264 1784 RegSvcs.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specification and shematic Diagram.exe"C:\Users\Admin\AppData\Local\Temp\Specification and shematic Diagram.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wgfpulfx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wgfpulfx.exe crocyb.ntu2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /sc minute /mo 5 /tn hzdhlig /tr "C:\Users\Admin\hzdhlig\wgfpulfx.exe C:\Users\Admin\hzdhlig\crocyb.ntu"3⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 5 /tn hzdhlig /tr "C:\Users\Admin\hzdhlig\wgfpulfx.exe C:\Users\Admin\hzdhlig\crocyb.ntu"4⤵
- Creates scheduled task(s)
PID:2496
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe03⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
PID:3108
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5139eac7d626feb59f0c7da60ac4060a3
SHA11227f2eccbc39c372e860702b2dbade6ed4ec3a5
SHA2567cfac465123c728deea11614fde04e28713dd214ffb8ec2c06e24463693f9bb6
SHA512a5e440c6bbc5e1ab536ac84b47a977054e65e3f5df5262abd046057e6b838cd314d7e2b5f4cc20695dbfb3e4a9141e7be9c6f1785fc52eed20037da807353312
-
Filesize
915KB
MD5b06e67f9767e5023892d9698703ad098
SHA1acc07666f4c1d4461d3e1c263cf6a194a8dd1544
SHA2568498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb
SHA5127972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196