Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    10-07-2020 13:34

General

  • Target

    FedExs AWB#5305323204643.exe

  • Size

    327KB

  • MD5

    4d535bf4723300864190a972b1d4f9ad

  • SHA1

    eeb49ecc3842af963b1ab9eb017c5d672ea7fb37

  • SHA256

    82a761b4157d1fa4e99dbf36c0f30935b19a1dd9875e330d81a70877aa07bc8a

  • SHA512

    7991bcb4756e291d3618db2e1010a763bf3227e4015d160d9fd122d1ad401d67dc8cd1884dbf4f2853a29ceab1dd277e9c1b1526b941554586af608ba53c5f0b

Malware Config

Signatures

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run entry to policy start application 2 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SendNotifyMessage
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\FedExs AWB#5305323204643.exe
      "C:\Users\Admin\AppData\Local\Temp\FedExs AWB#5305323204643.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1060
      • C:\Users\Admin\AppData\Local\Temp\FedExs AWB#5305323204643.exe
        "{path}"
        3⤵
          PID:1440
        • C:\Users\Admin\AppData\Local\Temp\FedExs AWB#5305323204643.exe
          "{path}"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:1452
      • C:\Windows\SysWOW64\control.exe
        "C:\Windows\SysWOW64\control.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • System policy modification
        • Suspicious use of WriteProcessMemory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Drops file in Program Files directory
        • Suspicious behavior: MapViewOfSection
        • Adds Run entry to policy start application
        PID:908
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\FedExs AWB#5305323204643.exe"
          3⤵
          • Deletes itself
          PID:788
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1864

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\K37-S9AE\K37logim.jpeg

      • C:\Users\Admin\AppData\Roaming\K37-S9AE\K37logrf.ini

      • C:\Users\Admin\AppData\Roaming\K37-S9AE\K37logri.ini

      • C:\Users\Admin\AppData\Roaming\K37-S9AE\K37logrv.ini

      • memory/788-6-0x0000000000000000-mapping.dmp

      • memory/908-5-0x0000000000650000-0x000000000066F000-memory.dmp

        Filesize

        124KB

      • memory/908-7-0x0000000001F90000-0x000000000203F000-memory.dmp

        Filesize

        700KB

      • memory/908-8-0x0000000076C90000-0x0000000076C9C000-memory.dmp

        Filesize

        48KB

      • memory/908-9-0x00000000761C0000-0x00000000762DD000-memory.dmp

        Filesize

        1.1MB

      • memory/908-15-0x0000000003890000-0x0000000003952000-memory.dmp

        Filesize

        776KB

      • memory/908-4-0x0000000000000000-mapping.dmp

      • memory/1060-1-0x0000000000000000-0x0000000000000000-disk.dmp

      • memory/1452-3-0x000000000041E2A0-mapping.dmp

      • memory/1452-2-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1864-16-0x0000000000000000-mapping.dmp

      • memory/1864-17-0x000000013FF40000-0x000000013FFD3000-memory.dmp

        Filesize

        588KB