Analysis
-
max time kernel
141s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe
Resource
win10v2004-20240802-en
General
-
Target
d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe
-
Size
128KB
-
MD5
35f4bac45ac7ea8aefa86d9bb87131d2
-
SHA1
a22fbf01e92813377c035de3fe43de01cd1b04f7
-
SHA256
d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584
-
SHA512
dbc2b1fae632888fd1fcc45b4a01372c9375c2cbb9c166507d72745fbf8280fc578e673aee4d2c631bd7ff44bcc167af5fc033f706feb14e0a141c5101704460
-
SSDEEP
3072:q+E6bAMOEVaT421edZs1LhsvlXR4VET421edZs:y5MOy2Os1Cl2MOs
Malware Config
Signatures
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Executes dropped EXE 1 IoCs
pid Process 2236 outlook.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\sys32.exe" d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\sys32.exe d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe File created C:\Windows\outlook.exe d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe File opened for modification C:\Windows\outlook.exe d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe File opened for modification C:\Windows\sys32.exe d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2688 2236 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outlook.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2236 2716 d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe 30 PID 2716 wrote to memory of 2236 2716 d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe 30 PID 2716 wrote to memory of 2236 2716 d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe 30 PID 2716 wrote to memory of 2236 2716 d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe 30 PID 2716 wrote to memory of 2236 2716 d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe 30 PID 2716 wrote to memory of 2236 2716 d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe 30 PID 2716 wrote to memory of 2236 2716 d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe 30 PID 2236 wrote to memory of 2688 2236 outlook.exe 31 PID 2236 wrote to memory of 2688 2236 outlook.exe 31 PID 2236 wrote to memory of 2688 2236 outlook.exe 31 PID 2236 wrote to memory of 2688 2236 outlook.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe"C:\Users\Admin\AppData\Local\Temp\d193eb5c3e84f42e152b5170447a12dc6ba79b22cae60496af08e605d1511584.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\outlook.exeC:\Windows\outlook.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 6603⤵
- Program crash
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD50e9379e357aba95f8b9883af9b67675e
SHA1280a174a414e5b8588f42b6328af2c8c8ff4394f
SHA25696b9c4ead67d03eb2c69103a983274e013e3466e80d8f95bd7cf3aea8be05b28
SHA5126cc383806882729cd889b025802ac0d5e1c55a74b3e7d7c98932644e8802fe52b5b14a886eff70ab7deaa70fb60bb9898e55b5cd83b5b99e2a2d107dce367784