Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
12-07-2020 11:26
Static task
static1
Behavioral task
behavioral1
Sample
2Owjjl45F6zxq40.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
2Owjjl45F6zxq40.exe
Resource
win10
General
-
Target
2Owjjl45F6zxq40.exe
-
Size
475KB
-
MD5
5a27d64f2afc5755986ed501f2561f00
-
SHA1
017c299bc06a8631b0646b732824dc33f0f74566
-
SHA256
2f645ad832ecb3de614ff355e67bb7db84812294921a247f7ce1c8b9667f56d0
-
SHA512
7ae558dc146c971ed0457d0a006269c6431375f2fb2c2fea88376ff968aafd4361ffb48ee371a53584c6e7e18354714d8b40f9bc87344e8b3f552d3910ead481
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
2Owjjl45F6zxq40.exemstsc.exepid process 1872 2Owjjl45F6zxq40.exe 1872 2Owjjl45F6zxq40.exe 1872 2Owjjl45F6zxq40.exe 1764 mstsc.exe 1764 mstsc.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1896 cmd.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
2Owjjl45F6zxq40.exeExplorer.EXEmstsc.exedescription pid process target process PID 1032 wrote to memory of 1824 1032 2Owjjl45F6zxq40.exe schtasks.exe PID 1032 wrote to memory of 1824 1032 2Owjjl45F6zxq40.exe schtasks.exe PID 1032 wrote to memory of 1824 1032 2Owjjl45F6zxq40.exe schtasks.exe PID 1032 wrote to memory of 1824 1032 2Owjjl45F6zxq40.exe schtasks.exe PID 1032 wrote to memory of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1032 wrote to memory of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1032 wrote to memory of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1032 wrote to memory of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1032 wrote to memory of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1032 wrote to memory of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1032 wrote to memory of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1320 wrote to memory of 1764 1320 Explorer.EXE mstsc.exe PID 1320 wrote to memory of 1764 1320 Explorer.EXE mstsc.exe PID 1320 wrote to memory of 1764 1320 Explorer.EXE mstsc.exe PID 1320 wrote to memory of 1764 1320 Explorer.EXE mstsc.exe PID 1764 wrote to memory of 1896 1764 mstsc.exe cmd.exe PID 1764 wrote to memory of 1896 1764 mstsc.exe cmd.exe PID 1764 wrote to memory of 1896 1764 mstsc.exe cmd.exe PID 1764 wrote to memory of 1896 1764 mstsc.exe cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2Owjjl45F6zxq40.exe2Owjjl45F6zxq40.exemstsc.exedescription pid process target process PID 1032 set thread context of 1872 1032 2Owjjl45F6zxq40.exe 2Owjjl45F6zxq40.exe PID 1872 set thread context of 1320 1872 2Owjjl45F6zxq40.exe Explorer.EXE PID 1764 set thread context of 1320 1764 mstsc.exe Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2Owjjl45F6zxq40.exemstsc.exedescription pid process Token: SeDebugPrivilege 1872 2Owjjl45F6zxq40.exe Token: SeDebugPrivilege 1764 mstsc.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
mstsc.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run mstsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MLRPLFP0VV = "C:\\Program Files (x86)\\Vk4j8prnp\\IconCachewb_t_ru0.exe" mstsc.exe -
Processes:
mstsc.exedescription ioc process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
2Owjjl45F6zxq40.exemstsc.exepid process 1872 2Owjjl45F6zxq40.exe 1872 2Owjjl45F6zxq40.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe 1764 mstsc.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
mstsc.exedescription ioc process File opened for modification C:\Program Files (x86)\Vk4j8prnp\IconCachewb_t_ru0.exe mstsc.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\2Owjjl45F6zxq40.exe"C:\Users\Admin\AppData\Local\Temp\2Owjjl45F6zxq40.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SZoiOuCCsbejrq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5540.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\2Owjjl45F6zxq40.exe"{path}"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\2Owjjl45F6zxq40.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5540.tmp
-
C:\Users\Admin\AppData\Roaming\JN052U35\JN0logim.jpeg
-
C:\Users\Admin\AppData\Roaming\JN052U35\JN0logri.ini
-
C:\Users\Admin\AppData\Roaming\JN052U35\JN0logrv.ini
-
memory/1764-4-0x0000000000000000-mapping.dmp
-
memory/1764-5-0x0000000000A40000-0x0000000000B44000-memory.dmpFilesize
1.0MB
-
memory/1764-7-0x00000000031C0000-0x0000000003332000-memory.dmpFilesize
1.4MB
-
memory/1824-0-0x0000000000000000-mapping.dmp
-
memory/1872-2-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1872-3-0x000000000041B6E0-mapping.dmp
-
memory/1896-6-0x0000000000000000-mapping.dmp