Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
file.exe
-
Size
178KB
-
MD5
269b3771f557dd8baf50335ab7165d81
-
SHA1
339394ee3109c21c6ee55b4aea36a8ac4c8444a7
-
SHA256
55fda8fe5169419bcbdfa68e712b378085ddd86638e0f84e50e6b6f43cf19334
-
SHA512
739abb3c8b81cde39fb1c10da9e911b27b9022ff326775f74f5cfb7912000be8062d50030b5824bba301f97356d877f3435954e9349a4fae9ba167376089d207
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 792 cmd.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1496 file.exe 1496 file.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wlanext.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8P-TYX0PFZ = "C:\\Program Files (x86)\\Flf9l_rn\\systrayabc.exe" wlanext.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1496 set thread context of 1228 1496 file.exe 20 PID 240 set thread context of 1228 240 wlanext.exe 20 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Flf9l_rn\systrayabc.exe wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1496 file.exe Token: SeDebugPrivilege 240 wlanext.exe Token: SeShutdownPrivilege 1228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1496 file.exe 1496 file.exe 1496 file.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe 240 wlanext.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1228 wrote to memory of 240 1228 Explorer.EXE 24 PID 1228 wrote to memory of 240 1228 Explorer.EXE 24 PID 1228 wrote to memory of 240 1228 Explorer.EXE 24 PID 1228 wrote to memory of 240 1228 Explorer.EXE 24 PID 240 wrote to memory of 792 240 wlanext.exe 25 PID 240 wrote to memory of 792 240 wlanext.exe 25 PID 240 wrote to memory of 792 240 wlanext.exe 25 PID 240 wrote to memory of 792 240 wlanext.exe 25 PID 240 wrote to memory of 1940 240 wlanext.exe 30 PID 240 wrote to memory of 1940 240 wlanext.exe 30 PID 240 wrote to memory of 1940 240 wlanext.exe 30 PID 240 wrote to memory of 1940 240 wlanext.exe 30 PID 240 wrote to memory of 1940 240 wlanext.exe 30 -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SendNotifyMessage
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:1496
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Adds Run entry to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
PID:240 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Deletes itself
PID:792
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1940
-
-