Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe
Resource
win10v2004-20240709-en
General
-
Target
367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe
-
Size
132KB
-
MD5
d50a3bd841116bf8e7b37268a56a5caf
-
SHA1
5dc5570a6c04a08cda97d61f330e8360f001a38e
-
SHA256
367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9
-
SHA512
9448b9e034693d793df31d00bf1ce662743230ec42a68b794a411a7ddfbc58c4dc2cf85715c0fc2ffa0c7cc294d53d2d8887da9b651411ec0ecd4b3290cc0ce3
-
SSDEEP
3072:2XGBC/lW8eCQUoGiFffkqlNyqrH5JUWsv4D6wN9l+:A/lWFLUoG+Iqr7Ug9l
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2388 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe 2388 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe"C:\Users\Admin\AppData\Local\Temp\367fd40edb75d6ae96ab9337a0688a0c710520b8e9687ad3b69863f93375e0f9.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5533fa0d156958b754f04d378798605a5
SHA1d98c7f2baa6c4318e872136ff31ee7e3c60af720
SHA256e9684ca668f610af058f7185880564680946e3f5c722b29dfd441e7d08e52f14
SHA5125a2c90a59d4c7b6cf7105de3aa8a12908b374d76502cc27732f809118d70dbabaead7fe531f6a14f7d58125a4ff200d71a97d358e09044f9023d1a9294b2d809