Analysis

  • max time kernel
    112s
  • resource
    win7v191014
  • submitted
    05-12-2019 16:37

General

  • Target

    289B.tmp.bin.exe

  • Sample

    191205-2zpm3225me

  • SHA256

    9b99297dd7c5e0e0a418fe6315d9d850013b62b3358444b8a825adeb80dd683c

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Reads Suhba user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Chrome user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Centbrowser user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Dragon user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Epic privacy browser user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Rockmelt user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Chedot user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Uran user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Chromium user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Waterfox user profile, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Tor Browser user profile, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Elements browser user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Chrome SxS user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Vivaldi user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Nichrome user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Qip surf user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Torch user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Go! user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Secure browser user data, possible credential harvesting 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Reads Superbird user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Kometa user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads 7star user data, possible credential harvesting 2 TTPs 1 IoCs
  • Raccoon

    It's the RaccAttack!

  • Reads Pale Moon browser user profile, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Bromium user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Firefox user profile, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Orbitum user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Sputnik user data, possible credential harvesting 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Reads Amigo user data, possible credential harvesting 2 TTPs 1 IoCs
  • Reads user profile for Thunderbird email client, possible credential harvesting 2 TTPs 1 IoCs
  • Reads Mustang user data, possible credential harvesting 2 TTPs 1 IoCs
  • Checks for installed software on the system 1 TTPs 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\289B.tmp.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\289B.tmp.bin.exe"
    1⤵
    • Loads dropped DLL
    • Reads Suhba user data, possible credential harvesting
    • Reads Chrome user data, possible credential harvesting
    • Reads Centbrowser user data, possible credential harvesting
    • Reads Dragon user data, possible credential harvesting
    • Reads Epic privacy browser user data, possible credential harvesting
    • Reads Rockmelt user data, possible credential harvesting
    • Reads Chedot user data, possible credential harvesting
    • Reads Uran user data, possible credential harvesting
    • Reads Chromium user data, possible credential harvesting
    • Reads Waterfox user profile, possible credential harvesting
    • Reads Tor Browser user profile, possible credential harvesting
    • Reads Elements browser user data, possible credential harvesting
    • Reads Chrome SxS user data, possible credential harvesting
    • Reads Vivaldi user data, possible credential harvesting
    • Reads Nichrome user data, possible credential harvesting
    • Reads Qip surf user data, possible credential harvesting
    • Reads Torch user data, possible credential harvesting
    • Reads Go! user data, possible credential harvesting
    • Reads Secure browser user data, possible credential harvesting
    • Reads Superbird user data, possible credential harvesting
    • Reads Kometa user data, possible credential harvesting
    • Reads 7star user data, possible credential harvesting
    • Reads Pale Moon browser user profile, possible credential harvesting
    • Reads Bromium user data, possible credential harvesting
    • Reads Firefox user profile, possible credential harvesting
    • Reads Orbitum user data, possible credential harvesting
    • Reads Sputnik user data, possible credential harvesting
    • Suspicious use of WriteProcessMemory
    • Reads Amigo user data, possible credential harvesting
    • Reads user profile for Thunderbird email client, possible credential harvesting
    • Reads Mustang user data, possible credential harvesting
    PID:1336
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\289B.tmp.bin.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • Runs ping.exe
        PID:1940
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-1548836680-533666437-679457699-1403319995-15752893778627448631697681750379809567"
    1⤵
      PID:1252

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    30
    T1081

    Discovery

    Remote System Discovery

    1
    T1018

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    30
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\LocalLow\AdLibs\mozglue.dll
    • \Users\Admin\AppData\LocalLow\AdLibs\msvcp140.dll
    • \Users\Admin\AppData\LocalLow\AdLibs\nss3.dll
    • \Users\Admin\AppData\LocalLow\AdLibs\vcruntime140.dll
    • \Users\Admin\AppData\LocalLow\sqlite3.dll
    • memory/1336-0-0x00000000002CA000-0x00000000002CB000-memory.dmp
      Filesize

      4KB

    • memory/1336-1-0x0000000000640000-0x0000000000651000-memory.dmp
      Filesize

      68KB