Analysis
-
max time kernel
149s -
max time network
112s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
Purchase advice and details.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Purchase advice and details.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Purchase advice and details.exe
-
Size
663KB
-
MD5
8c49a740ef92731629ce744ca1fece7b
-
SHA1
db2d80f5deba46f40be9357c3576e72aaed73ce5
-
SHA256
aea480ebd5777e840f0b988267554fe1d35f70238bed009231b24475fdc0b0d9
-
SHA512
eb78fcea1a1e5ceb762f620f21cf9e86eac873f1f27a6337e4d41a37396e79bf8bdbe46830e032f899df7d97aeca940d16b70255a4bcfa94430c8b78056c8c35
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Cyjlh\chkdsk3fylz.exe cmmon32.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cmmon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IZ7DANEXF0 = "C:\\Program Files (x86)\\Cyjlh\\chkdsk3fylz.exe" cmmon32.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Deletes itself 1 IoCs
pid Process 1420 cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1140 1116 Purchase advice and details.exe 24 PID 1116 wrote to memory of 1140 1116 Purchase advice and details.exe 24 PID 1116 wrote to memory of 1140 1116 Purchase advice and details.exe 24 PID 1116 wrote to memory of 1140 1116 Purchase advice and details.exe 24 PID 1308 wrote to memory of 1340 1308 Explorer.EXE 25 PID 1308 wrote to memory of 1340 1308 Explorer.EXE 25 PID 1308 wrote to memory of 1340 1308 Explorer.EXE 25 PID 1308 wrote to memory of 1340 1308 Explorer.EXE 25 PID 1340 wrote to memory of 1420 1340 cmmon32.exe 26 PID 1340 wrote to memory of 1420 1340 cmmon32.exe 26 PID 1340 wrote to memory of 1420 1340 cmmon32.exe 26 PID 1340 wrote to memory of 1420 1340 cmmon32.exe 26 PID 1340 wrote to memory of 1524 1340 cmmon32.exe 29 PID 1340 wrote to memory of 1524 1340 cmmon32.exe 29 PID 1340 wrote to memory of 1524 1340 cmmon32.exe 29 PID 1340 wrote to memory of 1524 1340 cmmon32.exe 29 PID 1340 wrote to memory of 1524 1340 cmmon32.exe 29 -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1116 Purchase advice and details.exe 1140 Purchase advice and details.exe 1140 Purchase advice and details.exe 1140 Purchase advice and details.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1116 set thread context of 1140 1116 Purchase advice and details.exe 24 PID 1140 set thread context of 1308 1140 Purchase advice and details.exe 20 PID 1340 set thread context of 1308 1340 cmmon32.exe 20 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1116 Purchase advice and details.exe 1140 Purchase advice and details.exe 1140 Purchase advice and details.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe 1340 cmmon32.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1140 Purchase advice and details.exe Token: SeDebugPrivilege 1340 cmmon32.exe Token: SeShutdownPrivilege 1308 Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Drops file in Program Files directory
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase advice and details.exe"3⤵
- Deletes itself
PID:1420
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1524
-
-