Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
01-07-2020 07:49
Static task
static1
Behavioral task
behavioral1
Sample
june30.dll
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
june30.dll
-
Size
607KB
-
MD5
086e1c7401f82543d162ebaef816ef35
-
SHA1
25fbe1ef6ed713011a02cd6fc930105d4f612130
-
SHA256
b8cef342a47915615a35aab7333567db7c86570d4d3362470e19b6d0b3dab1af
-
SHA512
be9bd937ef926cab65ada2f4103642993ae1428fa6b9a83f9824cc4f10cb07354954fa948a5d9b2c83ac79f7ac04269d9fb3ac8f21e46c53fdb2b4dd39c726f7
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 msiexec.exe 2160 msiexec.exe -
Runs net.exe
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3220 2040 rundll32.exe 68 PID 2040 wrote to memory of 3220 2040 rundll32.exe 68 PID 2040 wrote to memory of 3220 2040 rundll32.exe 68 PID 3220 wrote to memory of 2160 3220 rundll32.exe 73 PID 3220 wrote to memory of 2160 3220 rundll32.exe 73 PID 3220 wrote to memory of 2160 3220 rundll32.exe 73 PID 3220 wrote to memory of 2160 3220 rundll32.exe 73 PID 3220 wrote to memory of 2160 3220 rundll32.exe 73 PID 2160 wrote to memory of 3768 2160 msiexec.exe 74 PID 2160 wrote to memory of 3768 2160 msiexec.exe 74 PID 2160 wrote to memory of 3768 2160 msiexec.exe 74 PID 3768 wrote to memory of 3016 3768 cmd.exe 76 PID 3768 wrote to memory of 3016 3768 cmd.exe 76 PID 3768 wrote to memory of 3016 3768 cmd.exe 76 PID 2160 wrote to memory of 3900 2160 msiexec.exe 77 PID 2160 wrote to memory of 3900 2160 msiexec.exe 77 PID 2160 wrote to memory of 3900 2160 msiexec.exe 77 PID 3900 wrote to memory of 1892 3900 cmd.exe 79 PID 3900 wrote to memory of 1892 3900 cmd.exe 79 PID 3900 wrote to memory of 1892 3900 cmd.exe 79 PID 1892 wrote to memory of 1864 1892 net.exe 80 PID 1892 wrote to memory of 1864 1892 net.exe 80 PID 1892 wrote to memory of 1864 1892 net.exe 80 PID 2160 wrote to memory of 3540 2160 msiexec.exe 81 PID 2160 wrote to memory of 3540 2160 msiexec.exe 81 PID 2160 wrote to memory of 3540 2160 msiexec.exe 81 PID 3540 wrote to memory of 3560 3540 cmd.exe 83 PID 3540 wrote to memory of 3560 3540 cmd.exe 83 PID 3540 wrote to memory of 3560 3540 cmd.exe 83 PID 2160 wrote to memory of 3580 2160 msiexec.exe 84 PID 2160 wrote to memory of 3580 2160 msiexec.exe 84 PID 2160 wrote to memory of 3580 2160 msiexec.exe 84 PID 3580 wrote to memory of 3976 3580 cmd.exe 86 PID 3580 wrote to memory of 3976 3580 cmd.exe 86 PID 3580 wrote to memory of 3976 3580 cmd.exe 86 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2160 msiexec.exe Token: SeSecurityPrivilege 2160 msiexec.exe -
Blacklisted process makes network request 17 IoCs
flow pid Process 9 2160 msiexec.exe 10 2160 msiexec.exe 11 2160 msiexec.exe 12 2160 msiexec.exe 13 2160 msiexec.exe 14 2160 msiexec.exe 15 2160 msiexec.exe 16 2160 msiexec.exe 17 2160 msiexec.exe 18 2160 msiexec.exe 19 2160 msiexec.exe 20 2160 msiexec.exe 21 2160 msiexec.exe 22 2160 msiexec.exe 23 2160 msiexec.exe 24 2160 msiexec.exe 25 2160 msiexec.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 3560 net.exe 3976 net.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3220 set thread context of 2160 3220 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\june30.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\june30.dll,#12⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3220 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\net.exenet config workstation5⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:1864
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:3976
-
-
-
-