Analysis

  • max time kernel
    147s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    12-07-2020 11:25

General

  • Target

    cS7il0zOGtdU05K.exe

  • Size

    364KB

  • MD5

    b0cac1cdd3c9ab7d332811850ddd8ab9

  • SHA1

    750deac873706d16c1180ac9c3eda6f435828c3e

  • SHA256

    5300a0a0ca9bc1ac90ad1543fe3a1687db23b8f05194f86263938c57e0503b84

  • SHA512

    ebf73440a56091edacee8f04eb61f7aba66f5ca024bb3a10937eb41462146ab48295a9419e0e44fc5c5ec47affa0baf212555411a5f3f09ca9a946e20c3372fc

Score
7/10

Malware Config

Signatures

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe
      "C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      PID:4004
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SfeAvvANvSVV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp84C6.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2784
      • C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe
        "{path}"
        3⤵
          PID:3896
        • C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe
          "{path}"
          3⤵
            PID:3996
          • C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe
            "{path}"
            3⤵
              PID:3208
            • C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe
              "{path}"
              3⤵
                PID:3892
              • C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe
                "{path}"
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:3544
            • C:\Windows\SysWOW64\ipconfig.exe
              "C:\Windows\SysWOW64\ipconfig.exe"
              2⤵
              • Drops file in Program Files directory
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetThreadContext
              • Adds Run entry to start application
              • Suspicious use of WriteProcessMemory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:3940
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Local\Temp\cS7il0zOGtdU05K.exe"
                3⤵
                  PID:3260
                • C:\Windows\SysWOW64\cmd.exe
                  /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                  3⤵
                    PID:3396
              • C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
                C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
                1⤵
                  PID:2092

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Scheduled Task

                1
                T1053

                Registry Run Keys / Startup Folder

                1
                T1060

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Defense Evasion

                Modify Registry

                2
                T1112

                Credential Access

                Credentials in Files

                1
                T1081

                Collection

                Data from Local System

                1
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\DB1
                • C:\Users\Admin\AppData\Local\Temp\tmp84C6.tmp
                • C:\Users\Admin\AppData\Roaming\JN052U35\JN0logim.jpeg
                • C:\Users\Admin\AppData\Roaming\JN052U35\JN0logrg.ini
                • C:\Users\Admin\AppData\Roaming\JN052U35\JN0logri.ini
                • C:\Users\Admin\AppData\Roaming\JN052U35\JN0logrv.ini
                • memory/2784-0-0x0000000000000000-mapping.dmp
                • memory/3260-7-0x0000000000000000-mapping.dmp
                • memory/3396-10-0x0000000000000000-mapping.dmp
                • memory/3544-3-0x000000000041B6E0-mapping.dmp
                • memory/3544-2-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/3940-8-0x0000000000C10000-0x0000000000CC3000-memory.dmp
                  Filesize

                  716KB

                • memory/3940-6-0x0000000000CD0000-0x0000000000CDB000-memory.dmp
                  Filesize

                  44KB

                • memory/3940-5-0x0000000000CD0000-0x0000000000CDB000-memory.dmp
                  Filesize

                  44KB

                • memory/3940-4-0x0000000000000000-mapping.dmp