Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 01:56
Behavioral task
behavioral1
Sample
4C4183C8EBC475E86F0E75C7D99672EA.exe
Resource
win7-20240221-en
General
-
Target
4C4183C8EBC475E86F0E75C7D99672EA.exe
-
Size
90KB
-
MD5
4c4183c8ebc475e86f0e75c7d99672ea
-
SHA1
3dd803510d69a2ac5fdc286ef4ff093eee92f08b
-
SHA256
78d55cdf8b678679a373f1defc1062b4a9e3a23eb5fdcf0230ee032334f5ba0f
-
SHA512
7b1ad92b67b43bf18faa3613b1385770f9898d27f8aca9cf7368a9d25bb47fd6ce112fb97a6ee1fe65e79435baf9b8a6ab419455fc72ed5ea02126a6f9e29ecd
-
SSDEEP
1536:w68nFlZqTYyXNfnoS2t7zRKf/Sc2VTOLUUrvnYicbNOd0xTvaEiykzZXR:wRbWASKRKf/S8wUKNO3Eidh
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
4C4183C8EBC475E86F0E75C7D99672EA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 4C4183C8EBC475E86F0E75C7D99672EA.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
4C4183C8EBC475E86F0E75C7D99672EA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4C4183C8EBC475E86F0E75C7D99672EA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
4C4183C8EBC475E86F0E75C7D99672EA.exedescription pid process Token: SeImpersonatePrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe Token: SeTcbPrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe Token: SeChangeNotifyPrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe Token: SeCreateTokenPrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe Token: SeBackupPrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe Token: SeRestorePrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe Token: SeIncreaseQuotaPrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe Token: SeAssignPrimaryTokenPrivilege 216 4C4183C8EBC475E86F0E75C7D99672EA.exe -
outlook_win_path 1 IoCs
Processes:
4C4183C8EBC475E86F0E75C7D99672EA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4C4183C8EBC475E86F0E75C7D99672EA.exe