Analysis
-
max time kernel
90s -
max time network
122s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/06/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe
Resource
win11-20240426-en
General
-
Target
1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe
-
Size
2.0MB
-
MD5
53099afa75043ea832b64db81231caff
-
SHA1
86a1e59a058e26fec0765571291e98d17dafca12
-
SHA256
1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c
-
SHA512
45fda7812770b1748c8163cc3bd77f96e37390874f734b2a0757457252b3c64bd600fa562f472aaa512f6923fecbd0effc4ddaf670697304e7d7020bf16e6495
-
SSDEEP
24576:7wXn4671GiW2nM/2hXNzpwxIiN23hRKYrDobbd0sCGHjc3Z8FdgPFGA0:7wXn37hNVwxIR3GHg3ZbPy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3412 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe 3412 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe"C:\Users\Admin\AppData\Local\Temp\1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:3412