Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
Attached_Payroll_List.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Attached_Payroll_List.exe
Resource
win10v2004-20240802-en
General
-
Target
Attached_Payroll_List.exe
-
Size
637KB
-
MD5
0ffe2530b9fe03e3cc710467d04453ea
-
SHA1
d437359b8290692b59de3aef6db6e40fec57241b
-
SHA256
6a2f9d4bccf9e91d8cbe39b28de6ea1b2a6283fb4fb640d17c66ce53e851dd8c
-
SHA512
d514537524c446b2a6f1973f1a85079ce9bfeee4193adcc3bb5f493ded209f46df753c473399b8e715226b352c09158c49943201a129a8df70839fc488562384
-
SSDEEP
12288:vVmF8Bil3GVQJ8yWXTU4ymUNrRfXQ9LPkZw7TuscS:vVmLl3GuTWXTFCNrR6PewVcS
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wecutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\UJ-0G = "C:\\Program Files (x86)\\Windows Mail\\wab.exe" wecutil.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 wecutil.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3012 set thread context of 2932 3012 Attached_Payroll_List.exe 33 PID 2932 set thread context of 1200 2932 wab.exe 21 PID 2932 set thread context of 2792 2932 wab.exe 36 PID 2792 set thread context of 1200 2792 wecutil.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wecutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \Registry\User\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wecutil.exe -
Modifies registry class 17 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe230000100054487856cbc62b46816988e350acb88200000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{DE2B70EC-9BF7-4A93-BD3D-243F7881D492}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Contacts" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3012 Attached_Payroll_List.exe 2932 wab.exe 2932 wab.exe 2932 wab.exe 2932 wab.exe 2932 wab.exe 2932 wab.exe 2932 wab.exe 2932 wab.exe 2792 wecutil.exe 2792 wecutil.exe 2792 wecutil.exe 2792 wecutil.exe 2792 wecutil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2932 wab.exe 1200 Explorer.EXE 1200 Explorer.EXE 2792 wecutil.exe 2792 wecutil.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3012 Attached_Payroll_List.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2488 3012 Attached_Payroll_List.exe 31 PID 3012 wrote to memory of 2488 3012 Attached_Payroll_List.exe 31 PID 3012 wrote to memory of 2488 3012 Attached_Payroll_List.exe 31 PID 3012 wrote to memory of 2488 3012 Attached_Payroll_List.exe 31 PID 3012 wrote to memory of 2488 3012 Attached_Payroll_List.exe 31 PID 3012 wrote to memory of 2488 3012 Attached_Payroll_List.exe 31 PID 3012 wrote to memory of 2076 3012 Attached_Payroll_List.exe 32 PID 3012 wrote to memory of 2076 3012 Attached_Payroll_List.exe 32 PID 3012 wrote to memory of 2076 3012 Attached_Payroll_List.exe 32 PID 3012 wrote to memory of 2076 3012 Attached_Payroll_List.exe 32 PID 3012 wrote to memory of 2076 3012 Attached_Payroll_List.exe 32 PID 3012 wrote to memory of 2932 3012 Attached_Payroll_List.exe 33 PID 3012 wrote to memory of 2932 3012 Attached_Payroll_List.exe 33 PID 3012 wrote to memory of 2932 3012 Attached_Payroll_List.exe 33 PID 3012 wrote to memory of 2932 3012 Attached_Payroll_List.exe 33 PID 3012 wrote to memory of 2932 3012 Attached_Payroll_List.exe 33 PID 3012 wrote to memory of 2932 3012 Attached_Payroll_List.exe 33 PID 3012 wrote to memory of 2932 3012 Attached_Payroll_List.exe 33 PID 3012 wrote to memory of 2760 3012 Attached_Payroll_List.exe 34 PID 3012 wrote to memory of 2760 3012 Attached_Payroll_List.exe 34 PID 3012 wrote to memory of 2760 3012 Attached_Payroll_List.exe 34 PID 3012 wrote to memory of 2760 3012 Attached_Payroll_List.exe 34 PID 1200 wrote to memory of 2792 1200 Explorer.EXE 36 PID 1200 wrote to memory of 2792 1200 Explorer.EXE 36 PID 1200 wrote to memory of 2792 1200 Explorer.EXE 36 PID 1200 wrote to memory of 2792 1200 Explorer.EXE 36 PID 1200 wrote to memory of 2028 1200 Explorer.EXE 38 PID 1200 wrote to memory of 2028 1200 Explorer.EXE 38 PID 1200 wrote to memory of 2028 1200 Explorer.EXE 38 PID 1200 wrote to memory of 2028 1200 Explorer.EXE 38 PID 1200 wrote to memory of 2148 1200 Explorer.EXE 41 PID 1200 wrote to memory of 2148 1200 Explorer.EXE 41 PID 1200 wrote to memory of 2148 1200 Explorer.EXE 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Attached_Payroll_List.exe"C:\Users\Admin\AppData\Local\Temp\Attached_Payroll_List.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2488
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2076
-
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2932
-
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"3⤵PID:2760
-
-
-
C:\Windows\SysWOW64\wecutil.exe"C:\Windows\SysWOW64\wecutil.exe"2⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2792
-
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Program Files\Windows Mail\wab.exe"C:\Program Files\Windows Mail\wab.exe" /contact "C:\Users\Admin\Contacts\Admin.contact"2⤵PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD5fa9b7c190006303eecddffa019d0be06
SHA1a97cebc176b3daa453189f2c0b7cf2a5a70f9c92
SHA256dc7f8b3493543dc086cb43b66401893597f993408f18b437e5c8e8b5544db0bf
SHA5124c293ef052a14f7527aa42d451ba5f4cfdf7fb7203f583eda34ef24f4a2fd13975553c432a9354a0f8c1de924b0c29a819bd34c7aaa03b642372496a75be0532
-
Filesize
825KB
MD500a91261929192a7facc32a9f330029a
SHA17df4ffdf48a6df0bac21a82d6db56aa11db470dc
SHA256c1de8eca6419634c5f6e0e8c6ef14d9b3daa28fa28e8d1c4ce0175dbc310a77f
SHA51218a178ca0e70fa6e8f04b4ae229cfd6ef0df252e3fd85d09cf79f89e69ada89e3479db83227095a8c16325b1dc27c9ec0c782af304f7ce0afa78c2e25b49b01e