Analysis
-
max time kernel
146s -
max time network
112s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
file.exe
-
Size
178KB
-
MD5
269b3771f557dd8baf50335ab7165d81
-
SHA1
339394ee3109c21c6ee55b4aea36a8ac4c8444a7
-
SHA256
55fda8fe5169419bcbdfa68e712b378085ddd86638e0f84e50e6b6f43cf19334
-
SHA512
739abb3c8b81cde39fb1c10da9e911b27b9022ff326775f74f5cfb7912000be8062d50030b5824bba301f97356d877f3435954e9349a4fae9ba167376089d207
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Od2d8efex\useri4aprpk.exe msiexec.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1088 file.exe 1088 file.exe 1088 file.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1272 1276 Explorer.EXE 24 PID 1276 wrote to memory of 1272 1276 Explorer.EXE 24 PID 1276 wrote to memory of 1272 1276 Explorer.EXE 24 PID 1276 wrote to memory of 1272 1276 Explorer.EXE 24 PID 1276 wrote to memory of 1272 1276 Explorer.EXE 24 PID 1276 wrote to memory of 1272 1276 Explorer.EXE 24 PID 1276 wrote to memory of 1272 1276 Explorer.EXE 24 PID 1272 wrote to memory of 1312 1272 msiexec.exe 25 PID 1272 wrote to memory of 1312 1272 msiexec.exe 25 PID 1272 wrote to memory of 1312 1272 msiexec.exe 25 PID 1272 wrote to memory of 1312 1272 msiexec.exe 25 PID 1272 wrote to memory of 1028 1272 msiexec.exe 28 PID 1272 wrote to memory of 1028 1272 msiexec.exe 28 PID 1272 wrote to memory of 1028 1272 msiexec.exe 28 PID 1272 wrote to memory of 1028 1272 msiexec.exe 28 PID 1272 wrote to memory of 1028 1272 msiexec.exe 28 -
Deletes itself 1 IoCs
pid Process 1312 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FZ7DZREXFBW = "C:\\Program Files (x86)\\Od2d8efex\\useri4aprpk.exe" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1088 file.exe 1088 file.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe 1272 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1088 file.exe Token: SeDebugPrivilege 1272 msiexec.exe Token: SeShutdownPrivilege 1276 Explorer.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1088 set thread context of 1276 1088 file.exe 20 PID 1272 set thread context of 1276 1272 msiexec.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Checks whether UAC is enabled
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
PID:1088
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Modifies Internet Explorer settings
- Drops file in Program Files directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
PID:1272 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Deletes itself
PID:1312
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1028
-
-