Analysis

  • max time kernel
    113s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    09-07-2020 18:31

General

  • Target

    2370A6234D8A97737A93039E6129746750191DEC4B6F7015A61DB9A3AAA131C8.exe

  • Size

    3.6MB

  • MD5

    6a594f559bff2fa3ff115c0dc83336e5

  • SHA1

    d3c4f8223888e5c09397ed08ee701231ebdb1355

  • SHA256

    2370a6234d8a97737a93039e6129746750191dec4b6f7015a61db9a3aaa131c8

  • SHA512

    4c9093710174b0dcfd766fae20fb7ccf29aae6860ba34997cba07dab55b191253c3b762ab4f6a14c76be8c3a37f00bc995add3da0e087cd15714c76a16403d77

Score
7/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • js 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2370A6234D8A97737A93039E6129746750191DEC4B6F7015A61DB9A3AAA131C8.exe
    "C:\Users\Admin\AppData\Local\Temp\2370A6234D8A97737A93039E6129746750191DEC4B6F7015A61DB9A3AAA131C8.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • Modifies Internet Explorer settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Checks processor information in registry
    • Loads dropped DLL
    PID:1164
    • C:\Users\Admin\AppData\Local\Temp\2370A6234D8A97737A93039E6129746750191DEC4B6F7015A61DB9A3AAA131C8.exe
      "C:\Users\Admin\AppData\Local\Temp\2370A6234D8A97737A93039E6129746750191DEC4B6F7015A61DB9A3AAA131C8.exe" /_ShowProgress /mnl
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1164-6-0x0000000006030000-0x0000000006041000-memory.dmp

    Filesize

    68KB

  • memory/1164-2-0x0000000003760000-0x0000000003D22000-memory.dmp

    Filesize

    5.8MB

  • memory/1164-1-0x0000000002430000-0x0000000002747000-memory.dmp

    Filesize

    3.1MB

  • memory/1164-5-0x0000000005C20000-0x0000000005C31000-memory.dmp

    Filesize

    68KB

  • memory/1164-0-0x0000000002430000-0x0000000002747000-memory.dmp

    Filesize

    3.1MB

  • memory/1164-7-0x0000000005C20000-0x0000000005C31000-memory.dmp

    Filesize

    68KB

  • memory/1164-447-0x0000000005C20000-0x0000000005C31000-memory.dmp

    Filesize

    68KB

  • memory/1164-449-0x0000000005C20000-0x0000000005C31000-memory.dmp

    Filesize

    68KB

  • memory/1164-452-0x0000000005C20000-0x0000000005C31000-memory.dmp

    Filesize

    68KB

  • memory/1712-454-0x00000000024E0000-0x00000000027F7000-memory.dmp

    Filesize

    3.1MB

  • memory/1712-455-0x00000000024E0000-0x00000000027F7000-memory.dmp

    Filesize

    3.1MB

  • memory/1712-456-0x0000000003810000-0x0000000003DD2000-memory.dmp

    Filesize

    5.8MB