Analysis

  • max time kernel
    127s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    08/07/2020, 07:15

General

  • Target

    PO#87324.scr

  • Size

    689KB

  • MD5

    561b9a164ba940c40fafca1388cfba6e

  • SHA1

    de5c90e013c3ec5d65154ce7a06ea5bc81ff6dda

  • SHA256

    9daff52b5fd16bd2ff808e6b4ba02d6b46e00d27520ffaabdf42e20d1378a15c

  • SHA512

    e6a1ae9ac2d736a9f02a70dd2035f2bddd46737678ca769743f4450d67c4ff7ceeffac9f43e8b6fe16c0b0eeeb31b4b45eb7db1d4513dd85ae440294d4a10b9b

Score
8/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 16 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO#87324.scr
    "C:\Users\Admin\AppData\Local\Temp\PO#87324.scr" /S
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: MapViewOfSection
    • Adds Run entry to start application
    PID:1104
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\InstallUtil.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Users\Admin\AppData\Local\Temp\PrivacyOFF.exe
        "C:\Users\Admin\AppData\Local\Temp\PrivacyOFF.exe" 0
        3⤵
        • Executes dropped EXE
        PID:1640
      • C:\Users\Admin\AppData\Local\Temp\goon 2.exe
        "C:\Users\Admin\AppData\Local\Temp\goon 2.exe" 0
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious behavior: EnumeratesProcesses
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1420-0-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1420-2-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB