Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
6dd7773f1243d53e392e0d6c8f2c9b6d.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6dd7773f1243d53e392e0d6c8f2c9b6d.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
6dd7773f1243d53e392e0d6c8f2c9b6d.exe
-
Size
546KB
-
MD5
6dd7773f1243d53e392e0d6c8f2c9b6d
-
SHA1
20623a673280a1170bf2c06de4395e598db0b3eb
-
SHA256
51b2fe7ed5d6da110fe512ac143f26b29b8819b25f4540e93825d310d60d2511
-
SHA512
7767efa2ab0c0729dad5c140a1b87fc2b38b5e1b335f120b68828bd6fb6e775f7df3702788c25a2941c855e9fa493e7927206df44d7eb179b81a91751900cfde
Score
7/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1524 ieinstal.exe 1524 ieinstal.exe 1524 ieinstal.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Bfis = "C:\\Users\\Admin\\AppData\\Local\\Bfis\\Bfis.hta" 6dd7773f1243d53e392e0d6c8f2c9b6d.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wuapp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1344 wrote to memory of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1208 wrote to memory of 1792 1208 Explorer.EXE 27 PID 1208 wrote to memory of 1792 1208 Explorer.EXE 27 PID 1208 wrote to memory of 1792 1208 Explorer.EXE 27 PID 1208 wrote to memory of 1792 1208 Explorer.EXE 27 PID 1208 wrote to memory of 1792 1208 Explorer.EXE 27 PID 1208 wrote to memory of 1792 1208 Explorer.EXE 27 PID 1208 wrote to memory of 1792 1208 Explorer.EXE 27 PID 1792 wrote to memory of 1132 1792 wuapp.exe 28 PID 1792 wrote to memory of 1132 1792 wuapp.exe 28 PID 1792 wrote to memory of 1132 1792 wuapp.exe 28 PID 1792 wrote to memory of 1132 1792 wuapp.exe 28 PID 1792 wrote to memory of 1132 1792 wuapp.exe 28 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1344 set thread context of 1524 1344 6dd7773f1243d53e392e0d6c8f2c9b6d.exe 26 PID 1524 set thread context of 1208 1524 ieinstal.exe 20 PID 1524 set thread context of 1208 1524 ieinstal.exe 20 PID 1792 set thread context of 1208 1792 wuapp.exe 20 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1524 ieinstal.exe Token: SeDebugPrivilege 1792 wuapp.exe Token: SeShutdownPrivilege 1208 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1524 ieinstal.exe 1524 ieinstal.exe 1524 ieinstal.exe 1524 ieinstal.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe 1792 wuapp.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\6dd7773f1243d53e392e0d6c8f2c9b6d.exe"C:\Users\Admin\AppData\Local\Temp\6dd7773f1243d53e392e0d6c8f2c9b6d.exe"2⤵
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1344 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:1524
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:1792 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1132
-
-