Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    09-07-2020 11:06

General

  • Target

    fletë pagese.exe

  • Size

    649KB

  • MD5

    f536c98ef869e3a9d1d6776edbee76b1

  • SHA1

    0876c67101f3f146e293199971596a5b47123a4c

  • SHA256

    7f261df83598926b168c3515bde5a345dba7828d5bcbdedff5fc55cd16ec23a8

  • SHA512

    b26ab3b4c4d0117cca7e38f0e4b0d3f530888b776cf7b6f0e2fabb48af632ca678a509211e8797c928429071abf1b7667f2174a2aaacdf71bdd2a755650b11ae

Score
8/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Adds Run entry to policy start application 2 TTPs 2 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\fletë pagese.exe
      "C:\Users\Admin\AppData\Local\Temp\fletë pagese.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        PID:2684
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetThreadContext
      • Adds Run entry to start application
      • Adds Run entry to policy start application
      • Suspicious behavior: MapViewOfSection
      PID:2808
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
          PID:3992
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:3644

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DB1

      • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologim.jpeg

      • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrf.ini

      • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrg.ini

      • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologri.ini

      • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrv.ini

      • memory/992-0-0x0000000010410000-0x000000001043D000-memory.dmp

        Filesize

        180KB

      • memory/2684-1-0x0000000000000000-mapping.dmp

      • memory/2808-8-0x0000000005E30000-0x0000000005EBF000-memory.dmp

        Filesize

        572KB

      • memory/2808-7-0x0000000006860000-0x00000000069EB000-memory.dmp

        Filesize

        1.5MB

      • memory/2808-4-0x00000000010B0000-0x00000000010CF000-memory.dmp

        Filesize

        124KB

      • memory/2808-3-0x00000000010B0000-0x00000000010CF000-memory.dmp

        Filesize

        124KB

      • memory/2808-2-0x0000000000000000-mapping.dmp

      • memory/3644-9-0x0000000000000000-mapping.dmp

      • memory/3644-10-0x00007FF689240000-0x00007FF6892D3000-memory.dmp

        Filesize

        588KB

      • memory/3644-11-0x00007FF689240000-0x00007FF6892D3000-memory.dmp

        Filesize

        588KB

      • memory/3644-12-0x00007FF689240000-0x00007FF6892D3000-memory.dmp

        Filesize

        588KB

      • memory/3992-5-0x0000000000000000-mapping.dmp