Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
12/07/2020, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
kWxZdhzhxdbryQa.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
kWxZdhzhxdbryQa.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
kWxZdhzhxdbryQa.exe
-
Size
857KB
-
MD5
564298d99ec96cb82b246a8794de9b9b
-
SHA1
179c18e7891b967f9048e87362e21b26c73dc9d3
-
SHA256
95e40490a7ab8bc996d2a8a42233563ed067317e7b54a4083808a0d77ee2a5f5
-
SHA512
b1b012794842ae9cd72aca78679de8bd0b2c60a7cc0b6f0b4f69ca7a9c4b9210c28c4978d21dc33f5fef948f5ed7eb63302c4e0e822802aaac4d5b73d4920425
Score
10/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3768 set thread context of 2680 3768 kWxZdhzhxdbryQa.exe 74 PID 2680 set thread context of 3004 2680 kWxZdhzhxdbryQa.exe 56 PID 2872 set thread context of 3004 2872 msiexec.exe 56 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to policy start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\HPPDVFZXPJC = "C:\\Program Files (x86)\\Bd2kdh\\px4mhupl8lx.exe" msiexec.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3768 wrote to memory of 2220 3768 kWxZdhzhxdbryQa.exe 72 PID 3768 wrote to memory of 2220 3768 kWxZdhzhxdbryQa.exe 72 PID 3768 wrote to memory of 2220 3768 kWxZdhzhxdbryQa.exe 72 PID 3768 wrote to memory of 2680 3768 kWxZdhzhxdbryQa.exe 74 PID 3768 wrote to memory of 2680 3768 kWxZdhzhxdbryQa.exe 74 PID 3768 wrote to memory of 2680 3768 kWxZdhzhxdbryQa.exe 74 PID 3768 wrote to memory of 2680 3768 kWxZdhzhxdbryQa.exe 74 PID 3768 wrote to memory of 2680 3768 kWxZdhzhxdbryQa.exe 74 PID 3768 wrote to memory of 2680 3768 kWxZdhzhxdbryQa.exe 74 PID 3004 wrote to memory of 2872 3004 Explorer.EXE 75 PID 3004 wrote to memory of 2872 3004 Explorer.EXE 75 PID 3004 wrote to memory of 2872 3004 Explorer.EXE 75 PID 2872 wrote to memory of 3736 2872 msiexec.exe 76 PID 2872 wrote to memory of 3736 2872 msiexec.exe 76 PID 2872 wrote to memory of 3736 2872 msiexec.exe 76 PID 2872 wrote to memory of 3980 2872 msiexec.exe 78 PID 2872 wrote to memory of 3980 2872 msiexec.exe 78 PID 2872 wrote to memory of 3980 2872 msiexec.exe 78 -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2680 kWxZdhzhxdbryQa.exe 2680 kWxZdhzhxdbryQa.exe 2680 kWxZdhzhxdbryQa.exe 2872 msiexec.exe 2872 msiexec.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2220 schtasks.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Bd2kdh\px4mhupl8lx.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2680 kWxZdhzhxdbryQa.exe Token: SeDebugPrivilege 2872 msiexec.exe Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 Explorer.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3004 Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2680 kWxZdhzhxdbryQa.exe 2680 kWxZdhzhxdbryQa.exe 2680 kWxZdhzhxdbryQa.exe 2680 kWxZdhzhxdbryQa.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe 2872 msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\kWxZdhzhxdbryQa.exe"C:\Users\Admin\AppData\Local\Temp\kWxZdhzhxdbryQa.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jdjIVjDa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1591.tmp"3⤵
- Creates scheduled task(s)
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\kWxZdhzhxdbryQa.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Adds Run entry to policy start application
- System policy modification
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\kWxZdhzhxdbryQa.exe"3⤵PID:3736
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:3980
-
-