Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 05:55
Behavioral task
behavioral1
Sample
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
Resource
win10v2004-20241007-en
General
-
Target
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
-
Size
398KB
-
MD5
0d9d6b9514db21df74aff5e7d9a66c6f
-
SHA1
622b49e0bfd5c2524776936d70a3c0366030b6ba
-
SHA256
f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff
-
SHA512
51cad109f958bccee8c322e7d1ec0182d317bf44a59288159c418995a6dc0b6274039f8f1232bd6268e5b335358d1fb8eac5bc9f2270d4125f03e6178a4d005e
-
SSDEEP
12288:EnmOeWHehSjfhiPsxOticWgeEqq1sdeYo5H:EnmQISbA0wicWR
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2492 systeminfo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2360 1272 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 30 PID 1272 wrote to memory of 2360 1272 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 30 PID 1272 wrote to memory of 2360 1272 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 30 PID 2360 wrote to memory of 2492 2360 cmd.exe 32 PID 2360 wrote to memory of 2492 2360 cmd.exe 32 PID 2360 wrote to memory of 2492 2360 cmd.exe 32 PID 1272 wrote to memory of 2900 1272 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 35 PID 1272 wrote to memory of 2900 1272 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 35 PID 1272 wrote to memory of 2900 1272 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe 35 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe"C:\Users\Admin\AppData\Local\Temp\f33e8db7a25ec1c123fa8fb3094daaa5d6a630c1c19a4bcd61dca06ed7c339ff.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c systeminfo > "C:\Users\Admin\AppData\Local\Temp\8C982B7Es.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2492
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1272 -s 4082⤵PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5559c615d96fd908b173ac8ce96712098
SHA13f400356e4413c1891352a4ef8f9ccb6a89dffbb
SHA25681d206444ffe2e794e523a97a6dbc9e0105373a242b7e31989ca49a4932860bb
SHA512916eb471abc526744bd491d49f11ccba64a1b7d19dfac620892c88e4a2ce9bca8fe6f23c75f258a3609a86d21bcc9b138d07a1fef6272081ebadf4643ded34c4