Analysis
-
max time kernel
65s -
max time network
67s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08-07-2020 20:19
Static task
static1
Behavioral task
behavioral1
Sample
eTPiv.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
eTPiv.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
eTPiv.exe
-
Size
941KB
-
MD5
c126b47388c127334162f17ab4e0cb2c
-
SHA1
d74b2309be4af77691bd424ea8ab5055af89e587
-
SHA256
77867995d1e8388230c9f71fee5e835b346bfcfef3fde418c6a773eea11b4afd
-
SHA512
7abdf106235dfe7311bcc1a1d847a2b4c9223aa3e59c59c486c4cb310e535de71b3680c937695210be0013c7158aaca97e2e664bb89a8dd5c7306a6cf1c9537a
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SgrmBroker.comdescription pid process target process PID 1132 set thread context of 1480 1132 SgrmBroker.com ipconfig.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2636 1480 WerFault.exe ipconfig.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
eTPiv.execmd.exeSgrmBroker.comSgrmBroker.comipconfig.execmd.exedescription pid process target process PID 2916 wrote to memory of 560 2916 eTPiv.exe cmd.exe PID 2916 wrote to memory of 560 2916 eTPiv.exe cmd.exe PID 2916 wrote to memory of 560 2916 eTPiv.exe cmd.exe PID 560 wrote to memory of 900 560 cmd.exe certutil.exe PID 560 wrote to memory of 900 560 cmd.exe certutil.exe PID 560 wrote to memory of 900 560 cmd.exe certutil.exe PID 560 wrote to memory of 680 560 cmd.exe SgrmBroker.com PID 560 wrote to memory of 680 560 cmd.exe SgrmBroker.com PID 560 wrote to memory of 680 560 cmd.exe SgrmBroker.com PID 680 wrote to memory of 1132 680 SgrmBroker.com SgrmBroker.com PID 680 wrote to memory of 1132 680 SgrmBroker.com SgrmBroker.com PID 680 wrote to memory of 1132 680 SgrmBroker.com SgrmBroker.com PID 560 wrote to memory of 1360 560 cmd.exe PING.EXE PID 560 wrote to memory of 1360 560 cmd.exe PING.EXE PID 560 wrote to memory of 1360 560 cmd.exe PING.EXE PID 1132 wrote to memory of 1480 1132 SgrmBroker.com ipconfig.exe PID 1132 wrote to memory of 1480 1132 SgrmBroker.com ipconfig.exe PID 1132 wrote to memory of 1480 1132 SgrmBroker.com ipconfig.exe PID 1132 wrote to memory of 1480 1132 SgrmBroker.com ipconfig.exe PID 1480 wrote to memory of 1932 1480 ipconfig.exe cmd.exe PID 1480 wrote to memory of 1932 1480 ipconfig.exe cmd.exe PID 1480 wrote to memory of 1932 1480 ipconfig.exe cmd.exe PID 1932 wrote to memory of 2144 1932 cmd.exe PING.EXE PID 1932 wrote to memory of 2144 1932 cmd.exe PING.EXE PID 1932 wrote to memory of 2144 1932 cmd.exe PING.EXE -
Executes dropped EXE 2 IoCs
Processes:
SgrmBroker.comSgrmBroker.compid process 680 SgrmBroker.com 1132 SgrmBroker.com -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
SgrmBroker.comSgrmBroker.compid process 680 SgrmBroker.com 680 SgrmBroker.com 680 SgrmBroker.com 1132 SgrmBroker.com 1132 SgrmBroker.com 1132 SgrmBroker.com -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
SgrmBroker.comSgrmBroker.compid process 680 SgrmBroker.com 680 SgrmBroker.com 680 SgrmBroker.com 1132 SgrmBroker.com 1132 SgrmBroker.com 1132 SgrmBroker.com -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SgrmBroker.compid process 1132 SgrmBroker.com -
Checks for installed software on the system 1 TTPs 28 IoCs
Processes:
ipconfig.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName ipconfig.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName ipconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName ipconfig.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
eTPiv.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eTPiv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eTPiv.exe -
Runs ping.exe 1 TTPs 2 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\eTPiv.exe"C:\Users\Admin\AppData\Local\Temp\eTPiv.exe"1⤵
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
-
C:\Windows\SysWOW64\cmd.execmd /c <nul set /p ="M" > SgrmBroker.com & type JDhB.com >> SgrmBroker.com & del JDhB.com & certutil -decode GiEs.com A & SgrmBroker.com A & ping 127.0.0.1 -n 32⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\certutil.execertutil -decode GiEs.com A3⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SgrmBroker.comSgrmBroker.com A3⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SgrmBroker.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SgrmBroker.com A4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"5⤵
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping google.com && erase C:\Windows\SysWOW64\ipconfig.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping google.com7⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 13166⤵
- Program crash
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GiEs.com
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JDhB.com
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QJPvK.com
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SgrmBroker.com
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SgrmBroker.com
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SgrmBroker.com
-
memory/560-0-0x0000000000000000-mapping.dmp
-
memory/680-4-0x0000000000000000-mapping.dmp
-
memory/900-2-0x0000000000000000-mapping.dmp
-
memory/1132-7-0x0000000000000000-mapping.dmp
-
memory/1360-10-0x0000000000000000-mapping.dmp
-
memory/1480-13-0x00000000004258D4-mapping.dmp
-
memory/1480-12-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1480-14-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1932-15-0x0000000000000000-mapping.dmp
-
memory/2144-16-0x0000000000000000-mapping.dmp