Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    27-06-2020 05:32

General

  • Target

    SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe

  • Size

    346KB

  • MD5

    f577fbb7280758f98ad523a7b580d818

  • SHA1

    0c3262702dfec0ab6c305ab5126ee72b44eece07

  • SHA256

    00bd4de4ad3ccb503cb3e46030055454905d2a4033c03a462fd755af96edab27

  • SHA512

    d7d49d21710cf43050b9caa339462b63b20fb6419b129e37ad1e5b6c1675ab2bb33c70957dff612df9b47506d5c7b0f6f387f37c8377dfe294a713c7bff7a5ad

Malware Config

Signatures

  • Ursnif, Dreambot

    Ursnif is a variant of the Gozi IFSB with more capabilities.

  • Suspicious behavior: EnumeratesProcesses 955 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Checks whether UAC is enabled 7 IoCs
  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 67 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe"
      2⤵
        PID:2416
      • C:\Windows\System32\mshta.exe
        "C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\5A899765-F1C8-9C2D-4B2E-B590AF42B9C4\\\APHob_ps'));if(!window.flag)close()</script>"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\5A899765-F1C8-9C2D-4B2E-B590AF42B9C4").AppVdsrv))
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3556
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\psfwg3ds\psfwg3ds.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3684
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAEEE.tmp" "c:\Users\Admin\AppData\Local\Temp\psfwg3ds\CSCB10EB48FF73B41C4917FB7DA4688842D.TMP"
              5⤵
                PID:2880
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\whmyk3wv\whmyk3wv.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB0B3.tmp" "c:\Users\Admin\AppData\Local\Temp\whmyk3wv\CSC9B882D4084B44BE98CC05747D8CC1AE5.TMP"
                5⤵
                  PID:508
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HEME.26904.exe"
            2⤵
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1464
            • C:\Windows\system32\PING.EXE
              ping localhost -n 5
              3⤵
              • Runs ping.exe
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              PID:2960
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3496
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Checks whether UAC is enabled
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of FindShellTrayWindow
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:2900
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:82945 /prefetch:2
              2⤵
              • Checks whether UAC is enabled
              • Suspicious use of SetWindowsHookEx
              • Modifies Internet Explorer settings
              PID:3604
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Checks whether UAC is enabled
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of FindShellTrayWindow
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:3148
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3148 CREDAT:82945 /prefetch:2
              2⤵
              • Checks whether UAC is enabled
              • Suspicious use of SetWindowsHookEx
              • Modifies Internet Explorer settings
              PID:3860
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Checks whether UAC is enabled
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of FindShellTrayWindow
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:4032
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4032 CREDAT:82945 /prefetch:2
              2⤵
              • Checks whether UAC is enabled
              • Suspicious use of SetWindowsHookEx
              • Modifies Internet Explorer settings
              PID:1196
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4032 CREDAT:82951 /prefetch:2
              2⤵
              • Checks whether UAC is enabled
              • Suspicious use of SetWindowsHookEx
              • Modifies Internet Explorer settings
              PID:2288

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\434LGR37.cookie

          • C:\Users\Admin\AppData\Local\Temp\RESAEEE.tmp

          • C:\Users\Admin\AppData\Local\Temp\RESB0B3.tmp

          • C:\Users\Admin\AppData\Local\Temp\psfwg3ds\psfwg3ds.dll

          • C:\Users\Admin\AppData\Local\Temp\whmyk3wv\whmyk3wv.dll

          • \??\c:\Users\Admin\AppData\Local\Temp\psfwg3ds\CSCB10EB48FF73B41C4917FB7DA4688842D.TMP

          • \??\c:\Users\Admin\AppData\Local\Temp\psfwg3ds\psfwg3ds.0.cs

          • \??\c:\Users\Admin\AppData\Local\Temp\psfwg3ds\psfwg3ds.cmdline

          • \??\c:\Users\Admin\AppData\Local\Temp\whmyk3wv\CSC9B882D4084B44BE98CC05747D8CC1AE5.TMP

          • \??\c:\Users\Admin\AppData\Local\Temp\whmyk3wv\whmyk3wv.0.cs

          • \??\c:\Users\Admin\AppData\Local\Temp\whmyk3wv\whmyk3wv.cmdline

          • memory/508-19-0x0000000000000000-mapping.dmp

          • memory/1196-4-0x0000000000000000-mapping.dmp

          • memory/1464-24-0x0000005D1327D000-mapping.dmp

          • memory/1464-23-0x0000000000000000-mapping.dmp

          • memory/1724-16-0x0000000000000000-mapping.dmp

          • memory/2288-7-0x0000000000000000-mapping.dmp

          • memory/2416-0-0x0000000001D41000-0x0000000001D42000-memory.dmp

            Filesize

            4KB

          • memory/2416-1-0x0000000001E30000-0x0000000001E31000-memory.dmp

            Filesize

            4KB

          • memory/2880-12-0x0000000000000000-mapping.dmp

          • memory/2960-25-0x0000000000000000-mapping.dmp

          • memory/2960-26-0x0000009D4CD18000-mapping.dmp

          • memory/3556-8-0x0000000000000000-mapping.dmp

          • memory/3604-2-0x0000000000000000-mapping.dmp

          • memory/3684-9-0x0000000000000000-mapping.dmp

          • memory/3860-3-0x0000000000000000-mapping.dmp