Analysis

  • max time kernel
    149s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    09-07-2020 08:01

General

  • Target

    Purchase advice and details.exe

  • Size

    663KB

  • MD5

    8c49a740ef92731629ce744ca1fece7b

  • SHA1

    db2d80f5deba46f40be9357c3576e72aaed73ce5

  • SHA256

    aea480ebd5777e840f0b988267554fe1d35f70238bed009231b24475fdc0b0d9

  • SHA512

    eb78fcea1a1e5ceb762f620f21cf9e86eac873f1f27a6337e4d41a37396e79bf8bdbe46830e032f899df7d97aeca940d16b70255a4bcfa94430c8b78056c8c35

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SendNotifyMessage
    • Suspicious use of AdjustPrivilegeToken
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe
        "C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"
        3⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1140
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Drops file in Program Files directory
      • Adds Run entry to start application
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1340
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"
        3⤵
        • Deletes itself
        PID:1420
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1524

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\79OQ87VU\79Ologim.jpeg
    • C:\Users\Admin\AppData\Roaming\79OQ87VU\79Ologrf.ini
    • C:\Users\Admin\AppData\Roaming\79OQ87VU\79Ologri.ini
    • C:\Users\Admin\AppData\Roaming\79OQ87VU\79Ologrv.ini
    • memory/1140-0-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/1140-1-0x000000000041E350-mapping.dmp
    • memory/1340-8-0x00000000768C0000-0x0000000076A1C000-memory.dmp
      Filesize

      1.4MB

    • memory/1340-7-0x0000000075070000-0x000000007518D000-memory.dmp
      Filesize

      1.1MB

    • memory/1340-6-0x0000000077410000-0x000000007741C000-memory.dmp
      Filesize

      48KB

    • memory/1340-9-0x0000000003B00000-0x0000000003BE2000-memory.dmp
      Filesize

      904KB

    • memory/1340-5-0x0000000002F10000-0x0000000003015000-memory.dmp
      Filesize

      1.0MB

    • memory/1340-3-0x0000000000370000-0x000000000037D000-memory.dmp
      Filesize

      52KB

    • memory/1340-2-0x0000000000000000-mapping.dmp
    • memory/1420-4-0x0000000000000000-mapping.dmp
    • memory/1524-10-0x0000000000000000-mapping.dmp
    • memory/1524-11-0x000000013FDF0000-0x000000013FE83000-memory.dmp
      Filesize

      588KB