Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 11:03
Static task
static1
Behavioral task
behavioral1
Sample
oldmama.m83.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
oldmama.m83.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
oldmama.m83.exe
-
Size
179KB
-
MD5
8ab3e8276a19c042ec7a789e86462aea
-
SHA1
86904ffb2bdf8fa3e864ab50471bc8086e720999
-
SHA256
035c2fa5d912202dd34e8410b14a42b0db007c2be8ed819bbc444f9818497f5b
-
SHA512
9c9ad8236eb69ae9a748d83ac35224d4de0a563ba0af0431e85a4354f5e81fe5ab0491d2c0f5bbc2c61789f27889545731db5fcd16a6a0264845517422afa78d
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1032 oldmama.m83.exe 1032 oldmama.m83.exe 1032 oldmama.m83.exe 1032 oldmama.m83.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe -
Deletes itself 1 IoCs
pid Process 628 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE 1308 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run help.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OZTP_RBPT = "C:\\Program Files (x86)\\Xpbgpor5\\igfxzp1llp.exe" help.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1032 oldmama.m83.exe 1032 oldmama.m83.exe 1032 oldmama.m83.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe 1104 help.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1032 set thread context of 1308 1032 oldmama.m83.exe 20 PID 1032 set thread context of 1308 1032 oldmama.m83.exe 20 PID 1104 set thread context of 1308 1104 help.exe 20 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1032 oldmama.m83.exe Token: SeDebugPrivilege 1104 help.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1104 1032 oldmama.m83.exe 24 PID 1032 wrote to memory of 1104 1032 oldmama.m83.exe 24 PID 1032 wrote to memory of 1104 1032 oldmama.m83.exe 24 PID 1032 wrote to memory of 1104 1032 oldmama.m83.exe 24 PID 1104 wrote to memory of 628 1104 help.exe 25 PID 1104 wrote to memory of 628 1104 help.exe 25 PID 1104 wrote to memory of 628 1104 help.exe 25 PID 1104 wrote to memory of 628 1104 help.exe 25 PID 1104 wrote to memory of 1584 1104 help.exe 30 PID 1104 wrote to memory of 1584 1104 help.exe 30 PID 1104 wrote to memory of 1584 1104 help.exe 30 PID 1104 wrote to memory of 1584 1104 help.exe 30 PID 1104 wrote to memory of 1584 1104 help.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xpbgpor5\igfxzp1llp.exe help.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\oldmama.m83.exe"C:\Users\Admin\AppData\Local\Temp\oldmama.m83.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
PID:1104 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\oldmama.m83.exe"4⤵
- Deletes itself
PID:628
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"4⤵PID:1584
-
-
-