Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 08:27
Behavioral task
behavioral1
Sample
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
Resource
win10v2004-20241007-en
General
-
Target
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
-
Size
398KB
-
MD5
0d9d6b9514db21df74aff5e7d9a66c6f
-
SHA1
622b49e0bfd5c2524776936d70a3c0366030b6ba
-
SHA256
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff
-
SHA512
51cad109f958bccee8c322e7d1ec0182d317bf44a59288159c418995a6dc0b6274039f8f1232bd6268e5b335358d1fb8eac5bc9f2270d4125f03e6178a4d005e
-
SSDEEP
12288:EnmOeWHehSjfhiPsxOticWgeEqq1sdeYo5H:EnmQISbA0wicWR
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2800 systeminfo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2696 2660 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 30 PID 2660 wrote to memory of 2696 2660 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 30 PID 2660 wrote to memory of 2696 2660 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 30 PID 2696 wrote to memory of 2800 2696 cmd.exe 32 PID 2696 wrote to memory of 2800 2696 cmd.exe 32 PID 2696 wrote to memory of 2800 2696 cmd.exe 32 PID 2660 wrote to memory of 2556 2660 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 35 PID 2660 wrote to memory of 2556 2660 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 35 PID 2660 wrote to memory of 2556 2660 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 35 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe"C:\Users\Admin\AppData\Local\Temp\f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:2660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c systeminfo > "C:\Users\Admin\AppData\Local\Temp\3869CFC0s.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2800
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2660 -s 4882⤵PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dfbbc7564e3dbafc514b39c41d797ea
SHA15bed04d8a88ab89ee57c6010cbc6b5a3b411aee5
SHA2569e89ee26796f591913913075dd0dadadf17c0479dd2877bce4e2da3790cd1994
SHA5127c0ceb19ac64c60326fd1113bae49d5e8c1d705e9aaab97edb6d53dfe1ea96674f608e08966efc7b16489f481fa08dfad6812c3cca39fbd308a5d9b7486619d8