Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:18 UTC

General

  • Target

    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe

  • Size

    956KB

  • MD5

    36bb1d6a080898a3d78ee85fc56adee2

  • SHA1

    69871e4d11ad0ea04a9946199e996e2e65d8e179

  • SHA256

    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42

  • SHA512

    cf516dfb84aa30f81a06c6307ec7ee510302976b5af34119b7fae108ae8eeba88c4bdaf76796ee6ed42aacc1a1994dd99f8bbbc654189a254c0b698c71cfdaea

  • SSDEEP

    12288:vz7IFjvelQypyfy7z6u7+4DvbMUsIvOcg7:vz0FfMz6TEbMUs8Ot7

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    Trav01is@yandex.com
  • Password:
    Boy12345#

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    "C:\Users\Admin\AppData\Local\Temp\ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Roaming\app.exe
      "C:\Users\Admin\AppData\Roaming\app.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Roaming\app.exe
        "C:\Users\Admin\AppData\Roaming\app.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2328
      • C:\Users\Admin\AppData\Roaming\My.RawFile.exe
        "C:\Users\Admin\AppData\Roaming\My.RawFile.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:1232
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:340
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:832

Network

  • flag-us
    DNS
    crl.microsoft.com
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    Remote address:
    8.8.8.8:53
    Request
    crl.microsoft.com
    IN A
    Response
    crl.microsoft.com
    IN CNAME
    crl.www.ms.akadns.net
    crl.www.ms.akadns.net
    IN CNAME
    a1363.dscg.akamai.net
    a1363.dscg.akamai.net
    IN A
    2.19.252.157
    a1363.dscg.akamai.net
    IN A
    2.19.252.143
  • flag-gb
    GET
    http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    Remote address:
    2.19.252.157:80
    Request
    GET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Thu, 26 Sep 2024 02:21:11 GMT
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: crl.microsoft.com
    Response
    HTTP/1.1 200 OK
    Content-Length: 825
    Content-Type: application/octet-stream
    Content-MD5: O14L1mQEVqdJ2RVebBNXJw==
    Last-Modified: Wed, 26 Feb 2025 21:48:51 GMT
    ETag: 0x8DD56AF5BD2A499
    Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
    x-ms-request-id: 42091eff-701e-0052-4a9a-882b02000000
    x-ms-version: 2009-09-19
    x-ms-lease-status: unlocked
    x-ms-blob-type: BlockBlob
    Date: Sat, 22 Mar 2025 06:37:59 GMT
    Connection: keep-alive
  • flag-us
    DNS
    www.microsoft.com
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    23.192.18.101
  • flag-gb
    GET
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    Remote address:
    23.192.18.101:80
    Request
    GET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Sun, 18 Aug 2024 00:23:49 GMT
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: www.microsoft.com
    Response
    HTTP/1.1 200 OK
    Content-Length: 1078
    Content-Type: application/octet-stream
    Content-MD5: HqJzZuA065RHozzmOcAUiQ==
    Last-Modified: Tue, 14 Jan 2025 20:41:31 GMT
    ETag: 0x8DD34DBD43549F4
    x-ms-request-id: 90d94cda-601e-004e-55c9-667962000000
    x-ms-version: 2009-09-19
    x-ms-lease-status: unlocked
    x-ms-blob-type: BlockBlob
    Date: Sat, 22 Mar 2025 06:37:59 GMT
    Connection: keep-alive
    TLS_version: UNKNOWN
    ms-cv: CASMicrosoftCV1661754d.0
    ms-cv-esi: CASMicrosoftCV1661754d.0
    X-RTag: RT
  • flag-us
    DNS
    checkip.dyndns.org
    My.RawFile.exe
    Remote address:
    8.8.8.8:53
    Request
    checkip.dyndns.org
    IN A
    Response
    checkip.dyndns.org
    IN CNAME
    checkip.dyndns.com
    checkip.dyndns.com
    IN A
    132.226.8.169
    checkip.dyndns.com
    IN A
    193.122.6.168
    checkip.dyndns.com
    IN A
    193.122.130.0
    checkip.dyndns.com
    IN A
    158.101.44.242
    checkip.dyndns.com
    IN A
    132.226.247.73
  • flag-jp
    GET
    http://checkip.dyndns.org/
    My.RawFile.exe
    Remote address:
    132.226.8.169:80
    Request
    GET / HTTP/1.1
    Host: checkip.dyndns.org
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Sat, 22 Mar 2025 06:38:20 GMT
    Content-Type: text/html
    Content-Length: 106
    Connection: keep-alive
    Cache-Control: no-cache
    Pragma: no-cache
  • flag-us
    DNS
    smtp.yandex.com
    My.RawFile.exe
    Remote address:
    8.8.8.8:53
    Request
    smtp.yandex.com
    IN A
    Response
    smtp.yandex.com
    IN CNAME
    smtp.yandex.ru
    smtp.yandex.ru
    IN A
    77.88.21.158
  • 2.19.252.157:80
    http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
    http
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    503 B
    2.8kB
    6
    5

    HTTP Request

    GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl

    HTTP Response

    200
  • 23.192.18.101:80
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    http
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    439 B
    1.7kB
    5
    4

    HTTP Request

    GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl

    HTTP Response

    200
  • 132.226.8.169:80
    http://checkip.dyndns.org/
    http
    My.RawFile.exe
    344 B
    487 B
    6
    5

    HTTP Request

    GET http://checkip.dyndns.org/

    HTTP Response

    200
  • 77.88.21.158:587
    smtp.yandex.com
    smtp-submission
    My.RawFile.exe
    1.1kB
    5.9kB
    14
    15
  • 8.8.8.8:53
    crl.microsoft.com
    dns
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    63 B
    162 B
    1
    1

    DNS Request

    crl.microsoft.com

    DNS Response

    2.19.252.157
    2.19.252.143

  • 8.8.8.8:53
    www.microsoft.com
    dns
    ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    23.192.18.101

  • 8.8.8.8:53
    checkip.dyndns.org
    dns
    My.RawFile.exe
    64 B
    176 B
    1
    1

    DNS Request

    checkip.dyndns.org

    DNS Response

    132.226.8.169
    193.122.6.168
    193.122.130.0
    158.101.44.242
    132.226.247.73

  • 8.8.8.8:53
    smtp.yandex.com
    dns
    My.RawFile.exe
    61 B
    105 B
    1
    1

    DNS Request

    smtp.yandex.com

    DNS Response

    77.88.21.158

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f9f5f6c42c75546cda3231402836339

    SHA1

    a2fa257ba91e9f624ec75ad021828c4a1f4c1b12

    SHA256

    856be2370788ce8b8110694b69499c4debbc7d95baef9ad6bb78551993550f8a

    SHA512

    99d4ee06e6b82b46892c0e16bbeaab4bb9e2f0654712af2d6f7bb55484c4c5a1395f1149af386cdf70c98da7a5c227413187974e603e296d8c09a709c7e58c72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aae33d3a641dc13620aedd5df1ed1827

    SHA1

    ac36b40ef8b493445fe5a428df4b3b407630d67b

    SHA256

    b4f4b5281e980d666819c893ddfb88b3cd4572078878258c3b2436caa676d2a5

    SHA512

    57453182787ed85171de70facce797dc7da7d4265fa66d7abfef4d7bde7cc76e8b0bfa05900c4c1d2b6faa6f4aad925a05f652dae9a2bcd86ac558ea5f6f858f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba73164e689c49c6a15a8143754c7030

    SHA1

    2a70234ab70d177ee5bf2005b6f1b4737f3a24d7

    SHA256

    6a2f100f91ddd1cb572713711a38c89fa0dc2949dc1aebbf5223c3e7dac888a0

    SHA512

    a0d7bc668d93557501f220bdd299b90a99bc2846377f2c307de06fb0db991fe4ac5bad2d3f74c6160c3992f8bbe8376b4d72c0cd8f928c51421ef91cba1596c2

  • C:\Users\Admin\AppData\Local\Temp\CabDEEC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDEFF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\TarE272.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • C:\Users\Admin\AppData\Roaming\My.RawFile.exe

    Filesize

    142KB

    MD5

    5a733ef0de5e31e2e4b4abb016c0f251

    SHA1

    28644040a6deac35c20fa931b5d003a97293363e

    SHA256

    a80c77ca694eca3f6629c54572aba811e64b61975c5db2ff38c8d662d12b1ce7

    SHA512

    9d09ac6b6a560643cac08345ab6ef8578011b11be7d4821d7aa1b3d76f2801d30cb4d206a4ff9335f0ece5cfa2ec8258754b2481102eac3da064e5005f7ffba9

  • C:\Users\Admin\AppData\Roaming\app.exe

    Filesize

    962KB

    MD5

    fe60b7828a8a25de1d7ac1153f1e4b01

    SHA1

    77f81b66051703a8e604f00118e600fb399181ae

    SHA256

    310050e80a36e4023aa80db41a7af290b14636f8753e2f290d56a23d909b4264

    SHA512

    1ff5974a62839e55243afcdab9e6cb5abca8d46b168bf81cace84c71292b1aa02a17cde003ba7347abc4110a4844cc2888f1588c2a2a753c6bb3252c7496fc7f

  • memory/340-250-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/340-253-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/340-236-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/340-238-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/340-240-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/340-242-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/340-246-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/340-244-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/832-264-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/832-263-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/832-265-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2052-202-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2052-268-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-194-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-0-0x0000000074541000-0x0000000074542000-memory.dmp

    Filesize

    4KB

  • memory/2096-2-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-201-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-181-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-182-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-1-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.