Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 14:17

General

  • Target

    Attached_Payroll_List.exe

  • Size

    637KB

  • MD5

    0ffe2530b9fe03e3cc710467d04453ea

  • SHA1

    d437359b8290692b59de3aef6db6e40fec57241b

  • SHA256

    6a2f9d4bccf9e91d8cbe39b28de6ea1b2a6283fb4fb640d17c66ce53e851dd8c

  • SHA512

    d514537524c446b2a6f1973f1a85079ce9bfeee4193adcc3bb5f493ded209f46df753c473399b8e715226b352c09158c49943201a129a8df70839fc488562384

  • SSDEEP

    12288:vVmF8Bil3GVQJ8yWXTU4ymUNrRfXQ9LPkZw7TuscS:vVmLl3GuTWXTFCNrR6PewVcS

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\Attached_Payroll_List.exe
      "C:\Users\Admin\AppData\Local\Temp\Attached_Payroll_List.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
          PID:2488
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe"
          3⤵
            PID:2076
          • C:\Program Files (x86)\Windows Mail\wab.exe
            "C:\Program Files (x86)\Windows Mail\wab.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:2932
          • C:\Program Files (x86)\Windows Mail\wab.exe
            "C:\Program Files (x86)\Windows Mail\wab.exe"
            3⤵
              PID:2760
          • C:\Windows\SysWOW64\wecutil.exe
            "C:\Windows\SysWOW64\wecutil.exe"
            2⤵
            • Adds policy Run key to start application
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:2792
          • C:\Program Files (x86)\Windows Mail\wab.exe
            "C:\Program Files (x86)\Windows Mail\wab.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2028
          • C:\Program Files\Windows Mail\wab.exe
            "C:\Program Files\Windows Mail\wab.exe" /contact "C:\Users\Admin\Contacts\Admin.contact"
            2⤵
              PID:2148

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\fpx8z.zip

            Filesize

            431KB

            MD5

            fa9b7c190006303eecddffa019d0be06

            SHA1

            a97cebc176b3daa453189f2c0b7cf2a5a70f9c92

            SHA256

            dc7f8b3493543dc086cb43b66401893597f993408f18b437e5c8e8b5544db0bf

            SHA512

            4c293ef052a14f7527aa42d451ba5f4cfdf7fb7203f583eda34ef24f4a2fd13975553c432a9354a0f8c1de924b0c29a819bd34c7aaa03b642372496a75be0532

          • \Users\Admin\AppData\Local\Temp\sqlite3.dll

            Filesize

            825KB

            MD5

            00a91261929192a7facc32a9f330029a

            SHA1

            7df4ffdf48a6df0bac21a82d6db56aa11db470dc

            SHA256

            c1de8eca6419634c5f6e0e8c6ef14d9b3daa28fa28e8d1c4ce0175dbc310a77f

            SHA512

            18a178ca0e70fa6e8f04b4ae229cfd6ef0df252e3fd85d09cf79f89e69ada89e3479db83227095a8c16325b1dc27c9ec0c782af304f7ce0afa78c2e25b49b01e

          • memory/1200-19-0x0000000003BA0000-0x0000000003CA0000-memory.dmp

            Filesize

            1024KB

          • memory/1200-34-0x0000000005050000-0x0000000005101000-memory.dmp

            Filesize

            708KB

          • memory/1200-32-0x0000000005050000-0x0000000005101000-memory.dmp

            Filesize

            708KB

          • memory/1200-31-0x0000000005050000-0x0000000005101000-memory.dmp

            Filesize

            708KB

          • memory/1200-27-0x0000000009800000-0x000000000B409000-memory.dmp

            Filesize

            28.0MB

          • memory/1200-20-0x0000000009800000-0x000000000B409000-memory.dmp

            Filesize

            28.0MB

          • memory/2488-4-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2488-5-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2792-28-0x0000000000480000-0x000000000051D000-memory.dmp

            Filesize

            628KB

          • memory/2792-30-0x0000000000080000-0x00000000000BF000-memory.dmp

            Filesize

            252KB

          • memory/2792-73-0x0000000000080000-0x00000000000BF000-memory.dmp

            Filesize

            252KB

          • memory/2792-72-0x0000000061E00000-0x0000000061EBC000-memory.dmp

            Filesize

            752KB

          • memory/2792-33-0x0000000000480000-0x000000000051D000-memory.dmp

            Filesize

            628KB

          • memory/2792-26-0x0000000000080000-0x00000000000BF000-memory.dmp

            Filesize

            252KB

          • memory/2792-25-0x0000000000A20000-0x0000000000D23000-memory.dmp

            Filesize

            3.0MB

          • memory/2792-21-0x0000000000080000-0x00000000000BF000-memory.dmp

            Filesize

            252KB

          • memory/2792-22-0x0000000000080000-0x00000000000BF000-memory.dmp

            Filesize

            252KB

          • memory/2932-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2932-15-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2932-13-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2932-14-0x0000000000C90000-0x0000000000F93000-memory.dmp

            Filesize

            3.0MB

          • memory/2932-11-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2932-16-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2932-23-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2932-17-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2932-24-0x0000000000190000-0x00000000001AE000-memory.dmp

            Filesize

            120KB

          • memory/2932-18-0x0000000000190000-0x00000000001AE000-memory.dmp

            Filesize

            120KB

          • memory/3012-12-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

            Filesize

            9.9MB

          • memory/3012-2-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

            Filesize

            9.9MB

          • memory/3012-1-0x0000000000350000-0x000000000035A000-memory.dmp

            Filesize

            40KB

          • memory/3012-3-0x0000000000520000-0x00000000005BC000-memory.dmp

            Filesize

            624KB

          • memory/3012-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

            Filesize

            4KB