Analysis
-
max time kernel
89s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe
Resource
win10v2004-20240802-en
General
-
Target
2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe
-
Size
1.1MB
-
MD5
559bda48b0b2f7339b47b9515e2aece0
-
SHA1
17f7a9e0b2f660dadcefde296b31959c149b3cc1
-
SHA256
2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570
-
SHA512
ed039d4c67dc1e88599a4cdad883d83198e9d13633912e0d4f228251bcfeeee145072f88f70971205c4c57fad3805eeb6411b375fdeba196e490a28b8af6a12e
-
SSDEEP
24576:BhntGx9yVf41ob4s6ABttGZOATIZXTnR13/Jl:vtGZ1oEEbG8xXjz
Malware Config
Extracted
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
Diego1986
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 9 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4220-38-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/4220-37-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/4220-40-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/4504-49-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4504-50-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4504-51-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/4932-53-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4932-54-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/4932-61-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
NirSoft MailPassView 6 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4220-38-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/4220-37-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/4220-40-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/4504-49-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4504-50-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/4504-51-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 6 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4220-38-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/4220-37-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/4220-40-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/4932-53-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4932-54-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/4932-61-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe -
Executes dropped EXE 2 IoCs
pid Process 2640 magert.exe 4220 magert.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\Music\\magert.exe" 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 whatismyipaddress.com 39 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2640 set thread context of 4220 2640 magert.exe 94 PID 4220 set thread context of 4504 4220 magert.exe 95 PID 4220 set thread context of 4932 4220 magert.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language magert.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language magert.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 2640 magert.exe 2640 magert.exe 2640 magert.exe 2640 magert.exe 2640 magert.exe 2640 magert.exe 4932 vbc.exe 4932 vbc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe Token: SeDebugPrivilege 2640 magert.exe Token: SeDebugPrivilege 4220 magert.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4220 magert.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2640 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 91 PID 4696 wrote to memory of 2640 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 91 PID 4696 wrote to memory of 2640 4696 2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe 91 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 2640 wrote to memory of 4220 2640 magert.exe 94 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4504 4220 magert.exe 95 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96 PID 4220 wrote to memory of 4932 4220 magert.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe"C:\Users\Admin\AppData\Local\Temp\2cab23703ebd3b9f7092242d0007167e08244a1a1a24765fe7b58566beef8570N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\Music\magert.exe"C:\Users\Admin\Music\magert.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\Music\magert.exe"C:\Users\Admin\Music\magert.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526B
MD5a4a515e36daeb9da2c45320d448af44c
SHA1b73e69aa25f96d3e452b55a199d35b799239bbdd
SHA2561ca42a41fea4dff86c8e743a9536e96130675dd9a34d399fdbfe4ef6ee66e80a
SHA512c739c827885535f764a887d83b66fffab7228a4e6fbe5fe3a73dfd934544ad94b1b29a9570af345f68f7b68fbb30ad9ed9bf8e27f4086f6c6ea6f2cac01d89aa
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
Filesize
1.1MB
MD519786f1dc944521bcaf2fa9731d78f4f
SHA1a54744feb87f63a22261f9c78f9eadd358cc5b62
SHA256b06118277ff6a047fe7d59baa169029fc5fcd12cc5670d81e09dd74700fcf63f
SHA512e68d031f6583102ae76f9a8638a0a141dd59522368bcee8e6b716f1269cfba096440aabc26717392cf38cfcec2d5564ac18a0de6c088b4784a6d94b9aa3b94f4