Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 07:35
Static task
static1
Behavioral task
behavioral1
Sample
Attached is the new order, mecano group.exe
Resource
win7
Behavioral task
behavioral2
Sample
Attached is the new order, mecano group.exe
Resource
win10v200430
General
-
Target
Attached is the new order, mecano group.exe
-
Size
1.1MB
-
MD5
727396a68b9b5cbf700d7b948db6d830
-
SHA1
bd50594103f8554d8e076f0cc3a5a65c95586bee
-
SHA256
ca1d053d41842ab4052e83f395cfef43d3b79f16a5c437fbfcc10fef27c97ca8
-
SHA512
a1a1129d9630a3731daaf22bf67baa655bf8026da116e69d008641e9697dbaab9ac78a6a2c5acdeb733df64c8a343c88ef822adf07ace41cf95fbb64d8c0f3df
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Script User-Agent 2 IoCs
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Adds Run entry to policy start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run rundll32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
ieinstal.exerundll32.exepid process 1440 ieinstal.exe 1440 ieinstal.exe 1440 ieinstal.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ieinstal.exerundll32.exedescription pid process target process PID 1440 set thread context of 1264 1440 ieinstal.exe Explorer.EXE PID 1440 set thread context of 1264 1440 ieinstal.exe Explorer.EXE PID 912 set thread context of 1264 912 rundll32.exe Explorer.EXE -
Processes:
rundll32.exedescription ioc process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe -
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
ieinstal.exerundll32.exepid process 1440 ieinstal.exe 1440 ieinstal.exe 1440 ieinstal.exe 1440 ieinstal.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ieinstal.exerundll32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1440 ieinstal.exe Token: SeDebugPrivilege 912 rundll32.exe Token: SeShutdownPrivilege 1264 Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\K62XCZYPTH_ = "C:\\Program Files (x86)\\internet explorer\\ieinstal.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
Attached is the new order, mecano group.exeExplorer.EXErundll32.exedescription pid process target process PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe ieinstal.exe PID 1264 wrote to memory of 912 1264 Explorer.EXE rundll32.exe PID 1264 wrote to memory of 912 1264 Explorer.EXE rundll32.exe PID 1264 wrote to memory of 912 1264 Explorer.EXE rundll32.exe PID 1264 wrote to memory of 912 1264 Explorer.EXE rundll32.exe PID 1264 wrote to memory of 912 1264 Explorer.EXE rundll32.exe PID 1264 wrote to memory of 912 1264 Explorer.EXE rundll32.exe PID 1264 wrote to memory of 912 1264 Explorer.EXE rundll32.exe PID 912 wrote to memory of 1496 912 rundll32.exe Firefox.exe PID 912 wrote to memory of 1496 912 rundll32.exe Firefox.exe PID 912 wrote to memory of 1496 912 rundll32.exe Firefox.exe PID 912 wrote to memory of 1496 912 rundll32.exe Firefox.exe PID 912 wrote to memory of 1496 912 rundll32.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Adds Run entry to policy start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logim.jpeg
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logrf.ini
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logri.ini
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logrv.ini
-
memory/912-3-0x0000000000000000-mapping.dmp
-
memory/912-5-0x00000000030F0000-0x0000000003263000-memory.dmpFilesize
1.4MB
-
memory/912-6-0x0000000003AF0000-0x0000000003C22000-memory.dmpFilesize
1.2MB
-
memory/912-4-0x0000000000310000-0x000000000031E000-memory.dmpFilesize
56KB
-
memory/1132-0-0x0000000010410000-0x000000001043D000-memory.dmpFilesize
180KB
-
memory/1264-2-0x0000000007420000-0x000000000753E000-memory.dmpFilesize
1.1MB
-
memory/1440-1-0x0000000000000000-mapping.dmp
-
memory/1496-7-0x0000000000000000-mapping.dmp
-
memory/1496-8-0x000000013FDE0000-0x000000013FE73000-memory.dmpFilesize
588KB