Analysis

  • max time kernel
    69s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    09-07-2020 12:06

General

  • Target

    77448484848.scr

  • Size

    892KB

  • MD5

    70dba93e5db5b7b8fd48add53d608b3f

  • SHA1

    e23615d9f5cae44259f4ab24b5c32a629a85f1e3

  • SHA256

    d31c1aa598252bced9b3fef25a20045d48b91e929e8d7353ffd30bdb3a1a3cf4

  • SHA512

    415d08b466f6064bbadcb840ac11809fa360b0218c69d7a4c95f98caae96deefe8cf8519ad41b93a994bd268772f91d5a8acb663c7b8e3469074c303f3f52ec0

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 80 IoCs
  • Adds Run entry to start application 2 TTPs 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Suspicious use of WriteProcessMemory 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for installed software on the system 1 TTPs 14 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\77448484848.scr
    "C:\Users\Admin\AppData\Local\Temp\77448484848.scr" /S
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Roaming\01567419\gqshuqmkvj.pif
      "C:\Users\Admin\AppData\Roaming\01567419\gqshuqmkvj.pif" pjcgkpblx.bum
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Adds Run entry to start application
      • Suspicious use of WriteProcessMemory
      PID:3388
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • Checks for installed software on the system
        PID:628
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\76859.bat" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" "
          4⤵
            PID:1184
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • Checks for installed software on the system
          PID:644
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\76875.bat" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" "
            4⤵
              PID:1192

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/628-9-0x0000000000400000-0x0000000000997F0E-memory.dmp

        Filesize

        5.6MB

      • memory/628-12-0x0000000000400000-0x0000000000997F0E-memory.dmp

        Filesize

        5.6MB

      • memory/644-10-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/644-7-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB