Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
New Government Regulations Effective.exe
Resource
win7
Behavioral task
behavioral2
Sample
New Government Regulations Effective.exe
Resource
win10v200430
General
-
Target
New Government Regulations Effective.exe
-
Size
396KB
-
MD5
188567a5dc5ecb27eff09da32924bd03
-
SHA1
81015e96dd24740b8095391ea4c11aac2acc65e1
-
SHA256
8a8b601dbdc4a8b83fa1802be973df5562916711e95de88d77c0d86ce3a3e1e5
-
SHA512
18c7ec19d1bc4d7a9586f2a6c4a35a82ea210cec02bf2721338a3b6119e33b4edfe6722a1eca65f51ec866f7801f8a6413a3fcdbeecb2f41a3c76a5c44ae1233
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 324 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1552 wrote to memory of 324 1552 New Government Regulations Effective.exe 24 PID 1552 wrote to memory of 324 1552 New Government Regulations Effective.exe 24 PID 1552 wrote to memory of 324 1552 New Government Regulations Effective.exe 24 PID 1552 wrote to memory of 324 1552 New Government Regulations Effective.exe 24 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 PID 1552 wrote to memory of 1516 1552 New Government Regulations Effective.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1552 set thread context of 1516 1552 New Government Regulations Effective.exe 26 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1516 New Government Regulations Effective.exe -
Loads dropped DLL 6 IoCs
pid Process 1516 New Government Regulations Effective.exe 1516 New Government Regulations Effective.exe 1516 New Government Regulations Effective.exe 1516 New Government Regulations Effective.exe 1516 New Government Regulations Effective.exe 1516 New Government Regulations Effective.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Government Regulations Effective.exe"C:\Users\Admin\AppData\Local\Temp\New Government Regulations Effective.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1552 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\raXPFEQKDSj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp926F.tmp"2⤵
- Creates scheduled task(s)
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\New Government Regulations Effective.exe"C:\Users\Admin\AppData\Local\Temp\New Government Regulations Effective.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Loads dropped DLL
PID:1516
-