Analysis
-
max time kernel
146s -
max time network
91s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 11:20
Static task
static1
Behavioral task
behavioral1
Sample
R220917549.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
R220917549.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
R220917549.exe
-
Size
923KB
-
MD5
65e707bd6d53922eed2f27b35bd5355a
-
SHA1
8e2cb2687357567045584ed5cb36c11cc928f4a4
-
SHA256
ca2474c82643817c50106479f991ae282b9bb24fde98721dc5f99fe9a5eb3300
-
SHA512
606f8a9fab4b19fc43ed233f62fcefc3758e1e8fd6358b9fecbd8a3e3a43027ddded905ad2fc185eec7c3e14c1ad563ce007cb35f61797846807757b2ac1447a
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1492 R220917549.exe 276 R220917549.exe 276 R220917549.exe 276 R220917549.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe 1316 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1492 wrote to memory of 276 1492 R220917549.exe 24 PID 1492 wrote to memory of 276 1492 R220917549.exe 24 PID 1492 wrote to memory of 276 1492 R220917549.exe 24 PID 1492 wrote to memory of 276 1492 R220917549.exe 24 PID 1228 wrote to memory of 1316 1228 Explorer.EXE 39 PID 1228 wrote to memory of 1316 1228 Explorer.EXE 39 PID 1228 wrote to memory of 1316 1228 Explorer.EXE 39 PID 1228 wrote to memory of 1316 1228 Explorer.EXE 39 PID 1316 wrote to memory of 1804 1316 systray.exe 40 PID 1316 wrote to memory of 1804 1316 systray.exe 40 PID 1316 wrote to memory of 1804 1316 systray.exe 40 PID 1316 wrote to memory of 1804 1316 systray.exe 40 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1492 set thread context of 276 1492 R220917549.exe 24 PID 276 set thread context of 1228 276 R220917549.exe 20 PID 276 set thread context of 1228 276 R220917549.exe 20 PID 1316 set thread context of 1228 1316 systray.exe 20 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 276 R220917549.exe Token: SeDebugPrivilege 1316 systray.exe Token: SeShutdownPrivilege 1228 Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Ldr4pdxfp\serviceswfil_r.exe systray.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 systray.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1492 R220917549.exe 276 R220917549.exe 276 R220917549.exe 276 R220917549.exe 276 R220917549.exe 1316 systray.exe 1316 systray.exe -
Deletes itself 1 IoCs
pid Process 1804 cmd.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Adds Run entry to policy start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\JTEXV4RHRBP = "C:\\Program Files (x86)\\Ldr4pdxfp\\serviceswfil_r.exe" systray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run systray.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of SendNotifyMessage
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\R220917549.exe"C:\Users\Admin\AppData\Local\Temp\R220917549.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\R220917549.exe"C:\Users\Admin\AppData\Local\Temp\R220917549.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:276
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:484
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1600
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:800
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:756
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1104
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:324
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1056
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1052
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1044
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1036
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1512
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1508
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1496
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1668
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- System policy modification
- Suspicious use of AdjustPrivilegeToken
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Adds Run entry to policy start application
PID:1316 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\R220917549.exe"3⤵
- Deletes itself
PID:1804
-
-