Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 16:41

General

  • Target

    ff4188dc02e8d3dabea5b613c00d34cb.exe

  • Size

    3.2MB

  • MD5

    ff4188dc02e8d3dabea5b613c00d34cb

  • SHA1

    1bd4ef476c54795c28cb3acbaa44b2fbc4abc9ee

  • SHA256

    ea0c1b448dfd94060600f75faab6f2bb929269cf1a6498859cff129353e5d7da

  • SHA512

    14f0940053c2d0218e2ba325b585e20a5252ad57b29630a57607d4f70d390227148aa0bc366e4d57afc3cd7785d2e0ea9b7f9a96732a9699c346c9c3e39cc45a

  • SSDEEP

    49152:Fy6VlEbmYQ2gLOkmL35nZfmcb0Z7NANyu1DyTj9yMQoPwdCqp6aIrM1SI2ChbMTt:d5Okc35nlQN8y/JyQPHqp6Ribb2

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff4188dc02e8d3dabea5b613c00d34cb.exe
    "C:\Users\Admin\AppData\Local\Temp\ff4188dc02e8d3dabea5b613c00d34cb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\ff4188dc02e8d3dabea5b613c00d34cb.exe
      "C:\Users\Admin\AppData\Local\Temp\ff4188dc02e8d3dabea5b613c00d34cb.exe"
      2⤵
        PID:4528
      • C:\Users\Admin\AppData\Local\Temp\ff4188dc02e8d3dabea5b613c00d34cb.exe
        "C:\Users\Admin\AppData\Local\Temp\ff4188dc02e8d3dabea5b613c00d34cb.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Nnblf.tmpdb

      Filesize

      148KB

      MD5

      90a1d4b55edf36fa8b4cc6974ed7d4c4

      SHA1

      aba1b8d0e05421e7df5982899f626211c3c4b5c1

      SHA256

      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

      SHA512

      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

    • C:\Users\Admin\AppData\Local\Temp\Pebmneu.tmpdb

      Filesize

      92KB

      MD5

      2ea63f0be3b2e943a7f51d7079dcca06

      SHA1

      3f62664b4ac4bfa59f3668f31c3b82428acd29f4

      SHA256

      f6ba5e425749ce8f310fc68a6294bf02c2b867454384f5311f39dbe3826d40eb

      SHA512

      8b8d8f2642b74fd12604816d4fe8cc9449f9df38ee2f669cdd0ac740449ef63ce7e1bbefb2f62829677d8d40f4c4544d0a260e4a62e7ae4c18a3396b8c23f485

    • memory/1528-0-0x0000000073C9E000-0x0000000073C9F000-memory.dmp

      Filesize

      4KB

    • memory/1528-1-0x0000000000D10000-0x000000000104E000-memory.dmp

      Filesize

      3.2MB

    • memory/1528-2-0x0000000073C90000-0x000000007437E000-memory.dmp

      Filesize

      6.9MB

    • memory/1528-3-0x0000000005200000-0x0000000005540000-memory.dmp

      Filesize

      3.2MB

    • memory/1528-4-0x0000000006540000-0x00000000066E4000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-5-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-6-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-8-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-12-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-14-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-18-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-20-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-22-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-24-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-26-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-16-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-10-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-28-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-30-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-68-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-66-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-64-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-62-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-60-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-58-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-56-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-54-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-1041-0x0000000073C90000-0x000000007437E000-memory.dmp

      Filesize

      6.9MB

    • memory/1528-52-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-1042-0x0000000006B60000-0x0000000006C84000-memory.dmp

      Filesize

      1.1MB

    • memory/1528-1043-0x0000000000450000-0x000000000049C000-memory.dmp

      Filesize

      304KB

    • memory/1528-50-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-48-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-46-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-44-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-42-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-40-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-38-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-36-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-34-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-32-0x0000000006540000-0x00000000066DD000-memory.dmp

      Filesize

      1.6MB

    • memory/1528-1044-0x0000000000AE0000-0x0000000000B34000-memory.dmp

      Filesize

      336KB

    • memory/1528-1066-0x0000000073C90000-0x000000007437E000-memory.dmp

      Filesize

      6.9MB

    • memory/4564-1067-0x0000000004CA0000-0x0000000004DAE000-memory.dmp

      Filesize

      1.1MB

    • memory/4564-1065-0x0000000000400000-0x00000000004D6000-memory.dmp

      Filesize

      856KB

    • memory/4564-1068-0x0000000073C90000-0x000000007437E000-memory.dmp

      Filesize

      6.9MB

    • memory/4564-1142-0x0000000073C90000-0x000000007437E000-memory.dmp

      Filesize

      6.9MB

    • memory/4564-3918-0x0000000005480000-0x000000000551E000-memory.dmp

      Filesize

      632KB

    • memory/4564-3919-0x0000000004DB0000-0x0000000004DFC000-memory.dmp

      Filesize

      304KB

    • memory/4564-3920-0x0000000000B90000-0x0000000000B9A000-memory.dmp

      Filesize

      40KB

    • memory/4564-3921-0x00000000068E0000-0x000000000695A000-memory.dmp

      Filesize

      488KB

    • memory/4564-3954-0x0000000073C90000-0x000000007437E000-memory.dmp

      Filesize

      6.9MB