Analysis
-
max time kernel
127s -
max time network
142s -
platform
windows7_x64 -
resource
win7 -
submitted
08/07/2020, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
PO#87324.scr
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PO#87324.scr
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
PO#87324.scr
-
Size
689KB
-
MD5
561b9a164ba940c40fafca1388cfba6e
-
SHA1
de5c90e013c3ec5d65154ce7a06ea5bc81ff6dda
-
SHA256
9daff52b5fd16bd2ff808e6b4ba02d6b46e00d27520ffaabdf42e20d1378a15c
-
SHA512
e6a1ae9ac2d736a9f02a70dd2035f2bddd46737678ca769743f4450d67c4ff7ceeffac9f43e8b6fe16c0b0eeeb31b4b45eb7db1d4513dd85ae440294d4a10b9b
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1104 set thread context of 1420 1104 PO#87324.scr 24 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1420 InstallUtil.exe 276 goon 2.exe -
Loads dropped DLL 3 IoCs
pid Process 1420 InstallUtil.exe 1420 InstallUtil.exe 1420 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 276 goon 2.exe 276 goon 2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1104 wrote to memory of 1420 1104 PO#87324.scr 24 PID 1420 wrote to memory of 1640 1420 InstallUtil.exe 25 PID 1420 wrote to memory of 1640 1420 InstallUtil.exe 25 PID 1420 wrote to memory of 1640 1420 InstallUtil.exe 25 PID 1420 wrote to memory of 1640 1420 InstallUtil.exe 25 PID 1420 wrote to memory of 276 1420 InstallUtil.exe 26 PID 1420 wrote to memory of 276 1420 InstallUtil.exe 26 PID 1420 wrote to memory of 276 1420 InstallUtil.exe 26 PID 1420 wrote to memory of 276 1420 InstallUtil.exe 26 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1104 PO#87324.scr -
Executes dropped EXE 2 IoCs
pid Process 1640 PrivacyOFF.exe 276 goon 2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 276 goon 2.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\sVMOO = "C:\\AVGLFESB\\sVMOOf\\sVMOOfPUI.vbs" PO#87324.scr -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO#87324.scr"C:\Users\Admin\AppData\Local\Temp\PO#87324.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Adds Run entry to start application
PID:1104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\InstallUtil.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\PrivacyOFF.exe"C:\Users\Admin\AppData\Local\Temp\PrivacyOFF.exe" 03⤵
- Executes dropped EXE
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\goon 2.exe"C:\Users\Admin\AppData\Local\Temp\goon 2.exe" 03⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-