Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7 -
submitted
08/07/2020, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
Facturas.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Facturas.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Facturas.exe
-
Size
639KB
-
MD5
d42623d0669082db1713a751ef94fc68
-
SHA1
9d8bb3b343f1f380b799a16c38be6d546d3f7d00
-
SHA256
aa00f82fb3dd04417a278bc9362becdf39fcb3e4e23893327e16a8792334635f
-
SHA512
ffb5b361dae3aebb561bb0fe60a56ce63b957e686690cf96107e5cee76234f11ce6d4fc911ea56bf172599da92cef4609640d981ae74319761ff5d0e83c65660
Score
7/10
Malware Config
Signatures
-
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wuapp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VNU84HJ0 = "C:\\Program Files (x86)\\K5jr\\gdi_nux.exe" wuapp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 900 set thread context of 1104 900 Facturas.exe 24 PID 1104 set thread context of 1292 1104 Facturas.exe 20 PID 1432 set thread context of 1292 1432 wuapp.exe 20 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1104 Facturas.exe Token: SeDebugPrivilege 1432 wuapp.exe Token: SeShutdownPrivilege 1292 Explorer.EXE -
Deletes itself 1 IoCs
pid Process 1452 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\K5jr\gdi_nux.exe wuapp.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wuapp.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 900 Facturas.exe 1104 Facturas.exe 1104 Facturas.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe 1432 wuapp.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 900 wrote to memory of 1104 900 Facturas.exe 24 PID 900 wrote to memory of 1104 900 Facturas.exe 24 PID 900 wrote to memory of 1104 900 Facturas.exe 24 PID 900 wrote to memory of 1104 900 Facturas.exe 24 PID 1292 wrote to memory of 1432 1292 Explorer.EXE 25 PID 1292 wrote to memory of 1432 1292 Explorer.EXE 25 PID 1292 wrote to memory of 1432 1292 Explorer.EXE 25 PID 1292 wrote to memory of 1432 1292 Explorer.EXE 25 PID 1292 wrote to memory of 1432 1292 Explorer.EXE 25 PID 1292 wrote to memory of 1432 1292 Explorer.EXE 25 PID 1292 wrote to memory of 1432 1292 Explorer.EXE 25 PID 1432 wrote to memory of 1452 1432 wuapp.exe 26 PID 1432 wrote to memory of 1452 1432 wuapp.exe 26 PID 1432 wrote to memory of 1452 1432 wuapp.exe 26 PID 1432 wrote to memory of 1452 1432 wuapp.exe 26 -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 900 Facturas.exe 1104 Facturas.exe 1104 Facturas.exe 1104 Facturas.exe 1432 wuapp.exe 1432 wuapp.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Facturas.exe"C:\Users\Admin\AppData\Local\Temp\Facturas.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Facturas.exe"C:\Users\Admin\AppData\Local\Temp\Facturas.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1104
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Adds Run entry to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:1432 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Facturas.exe"3⤵
- Deletes itself
PID:1452
-
-