Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10_x64 -
resource
win10 -
submitted
07/07/2020, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
PRICE AND SPECIFICATION.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PRICE AND SPECIFICATION.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
PRICE AND SPECIFICATION.exe
-
Size
657KB
-
MD5
516f3f0b9f52bb65a396cb675c62b1fc
-
SHA1
d8e080586c8732542f871aa74e3aad882d59fa88
-
SHA256
fbf0680165efb20121f2cc3292421424ce7f8766b603579c1f7e9dfeee773ad3
-
SHA512
bab6acf0f9e5de8392adc6d5936fe81d45ad5a4f5851e27d40e558592155c437323b99622918baa803d3ec459d0644df33101e02889df3407b51c0def6faa285
Score
7/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3868 wrote to memory of 3064 3868 PRICE AND SPECIFICATION.exe 67 PID 3868 wrote to memory of 3064 3868 PRICE AND SPECIFICATION.exe 67 PID 3868 wrote to memory of 3064 3868 PRICE AND SPECIFICATION.exe 67 PID 3020 wrote to memory of 3892 3020 Explorer.EXE 68 PID 3020 wrote to memory of 3892 3020 Explorer.EXE 68 PID 3020 wrote to memory of 3892 3020 Explorer.EXE 68 PID 3892 wrote to memory of 3240 3892 cmmon32.exe 69 PID 3892 wrote to memory of 3240 3892 cmmon32.exe 69 PID 3892 wrote to memory of 3240 3892 cmmon32.exe 69 PID 3892 wrote to memory of 3136 3892 cmmon32.exe 73 PID 3892 wrote to memory of 3136 3892 cmmon32.exe 73 PID 3892 wrote to memory of 3136 3892 cmmon32.exe 73 PID 3892 wrote to memory of 392 3892 cmmon32.exe 75 PID 3892 wrote to memory of 392 3892 cmmon32.exe 75 PID 3892 wrote to memory of 392 3892 cmmon32.exe 75 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OJSDSPLPFH = "C:\\Program Files (x86)\\Dttr8lr3\\xjvhx6a8alc8or5.exe" cmmon32.exe Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cmmon32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Dttr8lr3\xjvhx6a8alc8or5.exe cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3868 PRICE AND SPECIFICATION.exe 3868 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 3868 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3064 PRICE AND SPECIFICATION.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe 3892 cmmon32.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3868 set thread context of 3064 3868 PRICE AND SPECIFICATION.exe 67 PID 3064 set thread context of 3020 3064 PRICE AND SPECIFICATION.exe 56 PID 3064 set thread context of 3020 3064 PRICE AND SPECIFICATION.exe 56 PID 3892 set thread context of 3020 3892 cmmon32.exe 56 -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3064 PRICE AND SPECIFICATION.exe Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeDebugPrivilege 3892 cmmon32.exe Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 Explorer.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3020 Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\PRICE AND SPECIFICATION.exe"C:\Users\Admin\AppData\Local\Temp\PRICE AND SPECIFICATION.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\PRICE AND SPECIFICATION.exe"C:\Users\Admin\AppData\Local\Temp\PRICE AND SPECIFICATION.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Modifies Internet Explorer settings
PID:3892 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PRICE AND SPECIFICATION.exe"3⤵PID:3240
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:3136
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:392
-
-