Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe
Resource
win7
0 signatures
0 seconds
General
-
Target
eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe
-
Size
1.1MB
-
MD5
b70279fc1c857dc76a50f77a46460657
-
SHA1
fbcabd564c13287b0a0d42026c77006f0c6e7983
-
SHA256
eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca
-
SHA512
424726d9175411466cb5fb0d99ecb843fb9609506b88e708c13717d5b47921485c370324b08f3f5379b6e7b2266ae30e45f49a6030ad2409446ec971ddbd761f
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeImpersonatePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeTcbPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeChangeNotifyPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeCreateTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeBackupPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeRestorePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeIncreaseQuotaPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeAssignPrimaryTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeImpersonatePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeTcbPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeChangeNotifyPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeCreateTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeBackupPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeRestorePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeIncreaseQuotaPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeAssignPrimaryTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeImpersonatePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeTcbPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeChangeNotifyPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeCreateTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeBackupPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeRestorePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeIncreaseQuotaPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeAssignPrimaryTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeImpersonatePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeTcbPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeChangeNotifyPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeCreateTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeBackupPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeRestorePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeIncreaseQuotaPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeAssignPrimaryTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeImpersonatePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeTcbPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeChangeNotifyPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeCreateTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeBackupPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeRestorePrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeIncreaseQuotaPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Token: SeAssignPrimaryTokenPrivilege 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4016 wrote to memory of 3836 4016 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe 67 PID 4016 wrote to memory of 3836 4016 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe 67 PID 4016 wrote to memory of 3836 4016 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe 67 PID 3836 wrote to memory of 3956 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe 68 PID 3836 wrote to memory of 3956 3836 eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe 68 PID 3956 wrote to memory of 4064 3956 cmd.exe 70 PID 3956 wrote to memory of 4064 3956 cmd.exe 70 -
Accesses cryptocurrency wallets, possible credential harvesting 2 TTPs
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4064 PING.EXE -
Script User-Agent 2 IoCs
description flow ioc HTTP User-Agent header 2 WinHttp.WinHttpRequest.5.1 HTTP User-Agent header 3 WinHttp.WinHttpRequest.5.1 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system 1 TTPs 7 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe"C:\Users\Admin\AppData\Local\Temp\eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exeC:\Users\Admin\AppData\Local\Temp\eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe dfsr2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
PID:3836 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c ping 127.0.0.1 & del /F /Q "C:\Users\Admin\AppData\Local\Temp\eda6bc27798b7230d63cae9225c466b67b05e788b315e4dc443c43cf1baabfca.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:4064
-
-
-