Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08-07-2020 15:19
Static task
static1
Behavioral task
behavioral1
Sample
evtrbz5n6um7j54g7.exe
Resource
win7
Behavioral task
behavioral2
Sample
evtrbz5n6um7j54g7.exe
Resource
win10v200430
General
-
Target
evtrbz5n6um7j54g7.exe
-
Size
1.4MB
-
MD5
5de08824a170627fed763ecbcbf60290
-
SHA1
57a2d4ff47c401e2619ba8626a8c91c6b34377b6
-
SHA256
69fe5bb4b975f9437b6c3bcf3f07dc807a8f2e848f1e0c5802012295b06a742c
-
SHA512
08f3f322e12c7c5d51028254208fda2763d5029d4d4bfb10cc31b2712cc659c7ffdfe1665efae40f4b55639d80ba7ca47a16ddfbc437397b03d56f8c6e81277c
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
HJnbva.exeIOmsda.exeHJnbva.exeIOmsda.exensMLailNiH.exekA1gdj1bAN.exerc.exeac.exejGBzqvMVKp.exeds1.exe2Yd3RFR8fL.exeds2.exepid process 1440 HJnbva.exe 1548 IOmsda.exe 1880 HJnbva.exe 2128 IOmsda.exe 3792 nsMLailNiH.exe 1180 kA1gdj1bAN.exe 1708 rc.exe 1344 ac.exe 1552 jGBzqvMVKp.exe 1860 ds1.exe 1364 2Yd3RFR8fL.exe 3688 ds2.exe -
Loads dropped DLL 15 IoCs
Processes:
evtrbz5n6um7j54g7.exeIOmsda.exeHJnbva.exepid process 1692 evtrbz5n6um7j54g7.exe 2128 IOmsda.exe 2128 IOmsda.exe 2128 IOmsda.exe 1880 HJnbva.exe 1880 HJnbva.exe 1880 HJnbva.exe 1880 HJnbva.exe 1880 HJnbva.exe 1880 HJnbva.exe 1692 evtrbz5n6um7j54g7.exe 1692 evtrbz5n6um7j54g7.exe 1692 evtrbz5n6um7j54g7.exe 1692 evtrbz5n6um7j54g7.exe 1692 evtrbz5n6um7j54g7.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
evtrbz5n6um7j54g7.exedescription ioc process File created C:\Users\Admin\AppData\LocalLow\cr6im03b56g32r\desktop.ini evtrbz5n6um7j54g7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
evtrbz5n6um7j54g7.exeHJnbva.exeIOmsda.exedescription pid process target process PID 2536 set thread context of 1692 2536 evtrbz5n6um7j54g7.exe evtrbz5n6um7j54g7.exe PID 1440 set thread context of 1880 1440 HJnbva.exe HJnbva.exe PID 1548 set thread context of 2128 1548 IOmsda.exe IOmsda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4076 1364 WerFault.exe 2Yd3RFR8fL.exe 2488 3688 WerFault.exe ds2.exe 1612 1552 WerFault.exe jGBzqvMVKp.exe 3888 1180 WerFault.exe kA1gdj1bAN.exe 700 1860 WerFault.exe ds1.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
IOmsda.exeHJnbva.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString IOmsda.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HJnbva.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HJnbva.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 3516 timeout.exe 2712 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3536 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
HJnbva.exepid process 1880 HJnbva.exe 1880 HJnbva.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
evtrbz5n6um7j54g7.exeHJnbva.exeIOmsda.exepid process 2536 evtrbz5n6um7j54g7.exe 1440 HJnbva.exe 1548 IOmsda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3536 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
evtrbz5n6um7j54g7.exeHJnbva.exeIOmsda.exepid process 2536 evtrbz5n6um7j54g7.exe 1440 HJnbva.exe 1548 IOmsda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
evtrbz5n6um7j54g7.exeHJnbva.exeIOmsda.exeIOmsda.execmd.exeevtrbz5n6um7j54g7.exeHJnbva.execmd.execmd.exerc.exensMLailNiH.exedescription pid process target process PID 2536 wrote to memory of 1440 2536 evtrbz5n6um7j54g7.exe HJnbva.exe PID 2536 wrote to memory of 1440 2536 evtrbz5n6um7j54g7.exe HJnbva.exe PID 2536 wrote to memory of 1440 2536 evtrbz5n6um7j54g7.exe HJnbva.exe PID 2536 wrote to memory of 1548 2536 evtrbz5n6um7j54g7.exe IOmsda.exe PID 2536 wrote to memory of 1548 2536 evtrbz5n6um7j54g7.exe IOmsda.exe PID 2536 wrote to memory of 1548 2536 evtrbz5n6um7j54g7.exe IOmsda.exe PID 2536 wrote to memory of 1692 2536 evtrbz5n6um7j54g7.exe evtrbz5n6um7j54g7.exe PID 2536 wrote to memory of 1692 2536 evtrbz5n6um7j54g7.exe evtrbz5n6um7j54g7.exe PID 2536 wrote to memory of 1692 2536 evtrbz5n6um7j54g7.exe evtrbz5n6um7j54g7.exe PID 2536 wrote to memory of 1692 2536 evtrbz5n6um7j54g7.exe evtrbz5n6um7j54g7.exe PID 1440 wrote to memory of 1880 1440 HJnbva.exe HJnbva.exe PID 1440 wrote to memory of 1880 1440 HJnbva.exe HJnbva.exe PID 1440 wrote to memory of 1880 1440 HJnbva.exe HJnbva.exe PID 1440 wrote to memory of 1880 1440 HJnbva.exe HJnbva.exe PID 1548 wrote to memory of 2128 1548 IOmsda.exe IOmsda.exe PID 1548 wrote to memory of 2128 1548 IOmsda.exe IOmsda.exe PID 1548 wrote to memory of 2128 1548 IOmsda.exe IOmsda.exe PID 1548 wrote to memory of 2128 1548 IOmsda.exe IOmsda.exe PID 2128 wrote to memory of 3504 2128 IOmsda.exe cmd.exe PID 2128 wrote to memory of 3504 2128 IOmsda.exe cmd.exe PID 2128 wrote to memory of 3504 2128 IOmsda.exe cmd.exe PID 3504 wrote to memory of 3536 3504 cmd.exe taskkill.exe PID 3504 wrote to memory of 3536 3504 cmd.exe taskkill.exe PID 3504 wrote to memory of 3536 3504 cmd.exe taskkill.exe PID 1692 wrote to memory of 3792 1692 evtrbz5n6um7j54g7.exe nsMLailNiH.exe PID 1692 wrote to memory of 3792 1692 evtrbz5n6um7j54g7.exe nsMLailNiH.exe PID 1692 wrote to memory of 3792 1692 evtrbz5n6um7j54g7.exe nsMLailNiH.exe PID 1692 wrote to memory of 1180 1692 evtrbz5n6um7j54g7.exe kA1gdj1bAN.exe PID 1692 wrote to memory of 1180 1692 evtrbz5n6um7j54g7.exe kA1gdj1bAN.exe PID 1692 wrote to memory of 1180 1692 evtrbz5n6um7j54g7.exe kA1gdj1bAN.exe PID 1880 wrote to memory of 1708 1880 HJnbva.exe rc.exe PID 1880 wrote to memory of 1708 1880 HJnbva.exe rc.exe PID 1880 wrote to memory of 1708 1880 HJnbva.exe rc.exe PID 1880 wrote to memory of 1344 1880 HJnbva.exe ac.exe PID 1880 wrote to memory of 1344 1880 HJnbva.exe ac.exe PID 1880 wrote to memory of 1344 1880 HJnbva.exe ac.exe PID 1692 wrote to memory of 1552 1692 evtrbz5n6um7j54g7.exe jGBzqvMVKp.exe PID 1692 wrote to memory of 1552 1692 evtrbz5n6um7j54g7.exe jGBzqvMVKp.exe PID 1692 wrote to memory of 1552 1692 evtrbz5n6um7j54g7.exe jGBzqvMVKp.exe PID 1880 wrote to memory of 1860 1880 HJnbva.exe ds1.exe PID 1880 wrote to memory of 1860 1880 HJnbva.exe ds1.exe PID 1880 wrote to memory of 1860 1880 HJnbva.exe ds1.exe PID 1692 wrote to memory of 1364 1692 evtrbz5n6um7j54g7.exe 2Yd3RFR8fL.exe PID 1692 wrote to memory of 1364 1692 evtrbz5n6um7j54g7.exe 2Yd3RFR8fL.exe PID 1692 wrote to memory of 1364 1692 evtrbz5n6um7j54g7.exe 2Yd3RFR8fL.exe PID 1692 wrote to memory of 2268 1692 evtrbz5n6um7j54g7.exe cmd.exe PID 1692 wrote to memory of 2268 1692 evtrbz5n6um7j54g7.exe cmd.exe PID 1692 wrote to memory of 2268 1692 evtrbz5n6um7j54g7.exe cmd.exe PID 1880 wrote to memory of 3688 1880 HJnbva.exe ds2.exe PID 1880 wrote to memory of 3688 1880 HJnbva.exe ds2.exe PID 1880 wrote to memory of 3688 1880 HJnbva.exe ds2.exe PID 2268 wrote to memory of 3516 2268 cmd.exe timeout.exe PID 2268 wrote to memory of 3516 2268 cmd.exe timeout.exe PID 2268 wrote to memory of 3516 2268 cmd.exe timeout.exe PID 1880 wrote to memory of 3872 1880 HJnbva.exe cmd.exe PID 1880 wrote to memory of 3872 1880 HJnbva.exe cmd.exe PID 1880 wrote to memory of 3872 1880 HJnbva.exe cmd.exe PID 3872 wrote to memory of 2712 3872 cmd.exe timeout.exe PID 3872 wrote to memory of 2712 3872 cmd.exe timeout.exe PID 3872 wrote to memory of 2712 3872 cmd.exe timeout.exe PID 1708 wrote to memory of 3608 1708 rc.exe TapiUnattend.exe PID 3792 wrote to memory of 1608 3792 nsMLailNiH.exe TapiUnattend.exe PID 1708 wrote to memory of 3608 1708 rc.exe TapiUnattend.exe PID 3792 wrote to memory of 1608 3792 nsMLailNiH.exe TapiUnattend.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\rc.exe"C:\Users\Admin\AppData\Local\Temp\rc.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"5⤵PID:3608
-
-
-
C:\Users\Admin\AppData\Local\Temp\ac.exe"C:\Users\Admin\AppData\Local\Temp\ac.exe"4⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KahrGgYA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp22EA.tmp"5⤵
- Creates scheduled task(s)
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\ds1.exe"C:\Users\Admin\AppData\Local\Temp\ds1.exe"4⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 11525⤵
- Program crash
PID:700
-
-
-
C:\Users\Admin\AppData\Local\Temp\ds2.exe"C:\Users\Admin\AppData\Local\Temp\ds2.exe"4⤵
- Executes dropped EXE
PID:3688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 11445⤵
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "HJnbva.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 35⤵
- Delays execution with timeout.exe
PID:2712
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 2128 & erase C:\Users\Admin\AppData\Local\Temp\IOmsda.exe & RD /S /Q C:\\ProgramData\\701895754257023\\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 21285⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\nsMLailNiH.exe"C:\Users\Admin\AppData\Local\Temp\nsMLailNiH.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"4⤵PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\kA1gdj1bAN.exe"C:\Users\Admin\AppData\Local\Temp\kA1gdj1bAN.exe"3⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 11444⤵
- Program crash
PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\jGBzqvMVKp.exe"C:\Users\Admin\AppData\Local\Temp\jGBzqvMVKp.exe"3⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 11364⤵
- Program crash
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\2Yd3RFR8fL.exe"C:\Users\Admin\AppData\Local\Temp\2Yd3RFR8fL.exe"3⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 11444⤵
- Program crash
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3516
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
-
-
-
-
-
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
556ea09421a0f74d31c4c0a89a70dc23
SHA1f739ba9b548ee64b13eb434a3130406d23f836e3
SHA256f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb
SHA5122481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2