Analysis
-
max time kernel
124s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe
-
Size
660KB
-
MD5
03a5ea04ef15bca68edf74f38463087e
-
SHA1
ce7ffb5982cb5c5a66854d4931c6be802b06cf3e
-
SHA256
0dfb3176683efa54883d71a9c575d15f2fcee4293e53dd99db71d9bdfed9913f
-
SHA512
5f9df5ec1e8338ef0935329decce78f1699dd835a48faacb869212c72e8fef0b6384c8c0e12abf19f41edd76366e9b9ee55152550025839a348ecd3ebde4b706
-
SSDEEP
12288:u2hpKuNFgElu1Wt2yAS6yFQTWnk1q1vvG2eZkmMwP3OI4kDkRpzA8aR:u2HKQNlZtlAS6yFMOPTVsqrAF
Malware Config
Signatures
-
Detected Nirsoft tools 9 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2688-24-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/2688-22-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/2688-21-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/5076-36-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/5076-37-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/5076-39-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/1940-42-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/1940-43-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/1940-50-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
NirSoft MailPassView 6 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2688-24-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/2688-22-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/2688-21-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/5076-36-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/5076-37-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/5076-39-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 6 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2688-24-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/2688-22-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/2688-21-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/1940-42-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/1940-43-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/1940-50-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Process = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xjkkViQA.exe" reg.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 whatismyipaddress.com 16 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4520 set thread context of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 2688 set thread context of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 set thread context of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1940 vbc.exe 1940 vbc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe Token: SeRestorePrivilege 4764 dw20.exe Token: SeBackupPrivilege 4764 dw20.exe Token: SeBackupPrivilege 4764 dw20.exe Token: SeBackupPrivilege 4764 dw20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4484 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 86 PID 4520 wrote to memory of 4484 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 86 PID 4520 wrote to memory of 4484 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 86 PID 4484 wrote to memory of 2624 4484 csc.exe 88 PID 4484 wrote to memory of 2624 4484 csc.exe 88 PID 4484 wrote to memory of 2624 4484 csc.exe 88 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 2688 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 89 PID 4520 wrote to memory of 548 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 90 PID 4520 wrote to memory of 548 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 90 PID 4520 wrote to memory of 548 4520 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 90 PID 548 wrote to memory of 4924 548 cmd.exe 92 PID 548 wrote to memory of 4924 548 cmd.exe 92 PID 548 wrote to memory of 4924 548 cmd.exe 92 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 5076 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 94 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 1940 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 95 PID 2688 wrote to memory of 4764 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 98 PID 2688 wrote to memory of 4764 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 98 PID 2688 wrote to memory of 4764 2688 2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xdztgu8f.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES712A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7129.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:5076
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 21563⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Process" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\xjkkViQA.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Process" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\xjkkViQA.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD520e27418a14b8b7d7c5ed17e14bb87a5
SHA146696b66b4d34b48cd4e314d5c1c7bd9233b0afa
SHA256c0fb0e1c2d45a056fc4bcdb15cab04451cc34248f8daa71e895015bdd71c119a
SHA512914bcf327a6350a5b033ea484636d38483f6884202fb6546320fa2dd159648c3788e293afbdfff7ee0581d563563d1fbfdf99725cb46997502fb603fc5885a94
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
Filesize
1.1MB
MD5b7a92dead252100094dbcaded3f27f9e
SHA1d73fa4cfe8e57fc47906c75dd5c26d56017aa910
SHA2562c462a7a532dc7d5dbe2861ad15233dc4ba63f38cb8dcf6c5b62a318177802c5
SHA512f87307b5effc0dd8c2f9ab4248cdc57c42072eb88c10280662521cfa6c149dce057cab74cb32bc4c81efbf3def18038d318a01eafae00412196f9ab6faf42298
-
Filesize
652B
MD56108aa96e219cbf8152be63da5dfc4e2
SHA1d1cac9d84a5af864e50c55b28a3fe3258cc59ac9
SHA2560a9013f3294d5899e02633ef95fa5014c0de14b97d7f68fdaf7bb1f7ac7666a5
SHA512d92dcbeff20cea6c8acfb4867fc63873059f6fdf0d48c704cd810c02ac0d99fcd7dedb07244f5f0923df4df1e6b0b2a94d038234de0562d545733a1bd3a1b351
-
Filesize
549KB
MD52685c4e3d19e4838a9ad3f51083652e5
SHA1ab52629512c4ea07fa0193d84c4df6a742ebec51
SHA256e49817106c90a6bf68190fe6f25951b0ec9ccc7c9ff5470ffad9c7c2985eefb3
SHA5124d09d4c8e27c5cb68412bed52d6282619a99a837f769c518a57ac163f6af64197b190841c9c664956f136ae45c2da610f9ae1910e17d2710da59661b571e01e7
-
Filesize
196B
MD5d7c0f957603f68dec9099fe29b71f410
SHA1ae788828113f80733c932266fbeceb5627a1a3a5
SHA256328892d90a6ed6ad4f50600770f16aae233630c21df82bb713d2f5e3c1131003
SHA5128ce3558b5841c47ae5137d7fa2b828c6d1b83e787510c03a5d9f651791e25bd6c7736630a421058d1f0f090cd671c93b8e75801c69aaeab323cb5c916ef990d6