Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:03
Static task
static1
Behavioral task
behavioral1
Sample
a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe
Resource
win10v2004-20241007-en
General
-
Target
a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe
-
Size
727KB
-
MD5
3ca5889359b328713a55e074e3456680
-
SHA1
1ed6e6472b6b06a332fce43622c3e42f8d98ca4b
-
SHA256
a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7
-
SHA512
83f08d3be3b3e8200f555d6affd5ffb0aa7c8efafa41a81fac72dd86f659abd83f4fd7843b436d9361d82b2e1fc95e5cf951239ada13ff6be6d1c4361be2966d
-
SSDEEP
6144:VWusAIFB++velibxPyp/64wjOjn6cB3rZtT/Yq3v9Auky+4N13724Ne:Vz7IFjvelQypyfy7z6u7+4D3724Ne
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation app.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe -
Executes dropped EXE 3 IoCs
pid Process 2940 app.exe 4772 app.exe 1148 My.RawFile.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\app.exe" a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2940 set thread context of 1028 2940 app.exe 100 PID 2940 set thread context of 776 2940 app.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language My.RawFile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 4772 app.exe 4772 app.exe 4772 app.exe 4772 app.exe 4772 app.exe 4772 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 1148 My.RawFile.exe 1148 My.RawFile.exe 1148 My.RawFile.exe 1148 My.RawFile.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe 2940 app.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe Token: SeDebugPrivilege 2940 app.exe Token: SeDebugPrivilege 4772 app.exe Token: SeDebugPrivilege 1148 My.RawFile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1148 My.RawFile.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2940 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 86 PID 2976 wrote to memory of 2940 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 86 PID 2976 wrote to memory of 2940 2976 a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe 86 PID 2940 wrote to memory of 4772 2940 app.exe 92 PID 2940 wrote to memory of 4772 2940 app.exe 92 PID 2940 wrote to memory of 4772 2940 app.exe 92 PID 2940 wrote to memory of 1148 2940 app.exe 98 PID 2940 wrote to memory of 1148 2940 app.exe 98 PID 2940 wrote to memory of 1148 2940 app.exe 98 PID 2940 wrote to memory of 776 2940 app.exe 99 PID 2940 wrote to memory of 776 2940 app.exe 99 PID 2940 wrote to memory of 776 2940 app.exe 99 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 1028 2940 app.exe 100 PID 2940 wrote to memory of 776 2940 app.exe 99 PID 2940 wrote to memory of 776 2940 app.exe 99 PID 2940 wrote to memory of 776 2940 app.exe 99 PID 2940 wrote to memory of 776 2940 app.exe 99 PID 2940 wrote to memory of 776 2940 app.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe"C:\Users\Admin\AppData\Local\Temp\a388448b2c597b32555757f009fab7e816349c3fb09899a873ea155596236bf7N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Users\Admin\AppData\Roaming\My.RawFile.exe"C:\Users\Admin\AppData\Roaming\My.RawFile.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1148
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:776
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20B
MD5b3ac9d09e3a47d5fd00c37e075a70ecb
SHA1ad14e6d0e07b00bd10d77a06d68841b20675680b
SHA2567a23c6e7ccd8811ecdf038d3a89d5c7d68ed37324bae2d4954125d9128fa9432
SHA51209b609ee1061205aa45b3c954efc6c1a03c8fd6b3011ff88cf2c060e19b1d7fd51ee0cb9d02a39310125f3a66aa0146261bdee3d804f472034df711bc942e316
-
Filesize
142KB
MD55a733ef0de5e31e2e4b4abb016c0f251
SHA128644040a6deac35c20fa931b5d003a97293363e
SHA256a80c77ca694eca3f6629c54572aba811e64b61975c5db2ff38c8d662d12b1ce7
SHA5129d09ac6b6a560643cac08345ab6ef8578011b11be7d4821d7aa1b3d76f2801d30cb4d206a4ff9335f0ece5cfa2ec8258754b2481102eac3da064e5005f7ffba9
-
Filesize
736KB
MD513729ce8472c3c7f639c19353e17a6fb
SHA170659dc983184f727d50d881a67451ffd0b92ddb
SHA25672b1cc99dfbc695d4bcc6f5ecfd67d7b4161aa3ca8fc78831c960bf123b8f0be
SHA51239560fc1b8c3188163467954e9f727bc7d46787efe91b9bd95f8b3cbfdd53a057eb59b40591defbda0759523af5e990e664a94af7826ae0f73edea336a2a1632