Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13-07-2020 07:35
Static task
static1
Behavioral task
behavioral1
Sample
Attached is the new order, mecano group.exe
Resource
win7
Behavioral task
behavioral2
Sample
Attached is the new order, mecano group.exe
Resource
win10v200430
General
-
Target
Attached is the new order, mecano group.exe
-
Size
1.1MB
-
MD5
727396a68b9b5cbf700d7b948db6d830
-
SHA1
bd50594103f8554d8e076f0cc3a5a65c95586bee
-
SHA256
ca1d053d41842ab4052e83f395cfef43d3b79f16a5c437fbfcc10fef27c97ca8
-
SHA512
a1a1129d9630a3731daaf22bf67baa655bf8026da116e69d008641e9697dbaab9ac78a6a2c5acdeb733df64c8a343c88ef822adf07ace41cf95fbb64d8c0f3df
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
ieinstal.exemsdt.exepid process 1812 ieinstal.exe 1812 ieinstal.exe 1812 ieinstal.exe 1812 ieinstal.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
ieinstal.exemsdt.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1812 ieinstal.exe Token: SeDebugPrivilege 2392 msdt.exe Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
ieinstal.exemsdt.exepid process 1812 ieinstal.exe 1812 ieinstal.exe 1812 ieinstal.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ieinstal.exemsdt.exedescription pid process target process PID 1812 set thread context of 2984 1812 ieinstal.exe Explorer.EXE PID 2392 set thread context of 2984 2392 msdt.exe Explorer.EXE -
Adds Run entry to start application 2 TTPs 1 IoCs
Processes:
msdt.exedescription ioc process Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run msdt.exe -
Processes:
msdt.exedescription ioc process Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Attached is the new order, mecano group.exeExplorer.EXEmsdt.exedescription pid process target process PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe ieinstal.exe PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe ieinstal.exe PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe ieinstal.exe PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe ieinstal.exe PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe ieinstal.exe PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe ieinstal.exe PID 2984 wrote to memory of 2392 2984 Explorer.EXE msdt.exe PID 2984 wrote to memory of 2392 2984 Explorer.EXE msdt.exe PID 2984 wrote to memory of 2392 2984 Explorer.EXE msdt.exe PID 2392 wrote to memory of 2784 2392 msdt.exe cmd.exe PID 2392 wrote to memory of 2784 2392 msdt.exe cmd.exe PID 2392 wrote to memory of 2784 2392 msdt.exe cmd.exe PID 2392 wrote to memory of 3000 2392 msdt.exe Firefox.exe PID 2392 wrote to memory of 3000 2392 msdt.exe Firefox.exe PID 2392 wrote to memory of 3000 2392 msdt.exe Firefox.exe -
Adds Run entry to policy start application 2 TTPs 2 IoCs
Processes:
msdt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\YNVHZLYXCNY = "C:\\Program Files (x86)\\internet explorer\\ieinstal.exe" msdt.exe Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msdt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Adds Run entry to policy start application
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DB1
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logim.jpeg
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logrf.ini
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logrg.ini
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logri.ini
-
C:\Users\Admin\AppData\Roaming\-65A6372\-65logrv.ini
-
memory/664-0-0x0000000010410000-0x000000001043D000-memory.dmpFilesize
180KB
-
memory/1812-1-0x0000000000000000-mapping.dmp
-
memory/2392-4-0x0000000000D20000-0x0000000000E93000-memory.dmpFilesize
1.4MB
-
memory/2392-3-0x0000000000D20000-0x0000000000E93000-memory.dmpFilesize
1.4MB
-
memory/2392-2-0x0000000000000000-mapping.dmp
-
memory/2784-5-0x0000000000000000-mapping.dmp
-
memory/3000-10-0x00007FF717E20000-0x00007FF717EB3000-memory.dmpFilesize
588KB
-
memory/3000-11-0x00007FF717E20000-0x00007FF717EB3000-memory.dmpFilesize
588KB
-
memory/3000-9-0x00007FF717E20000-0x00007FF717EB3000-memory.dmpFilesize
588KB
-
memory/3000-8-0x0000000000000000-mapping.dmp