Analysis
-
max time kernel
144s -
max time network
57s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15/07/2020, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
crap2.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
crap2.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
crap2.exe
-
Size
2.1MB
-
MD5
2ce8d725e481672aba2666d6c8ca677b
-
SHA1
1c803bc93ee4e1c089c495a2e5a4b425512db521
-
SHA256
3ce977e8755d830e2a4b32dc580d69d8a2e45313cd462264bd09dc255c3ee7cb
-
SHA512
260a2faec4956cdcdce6f07d5e319b86e7cb513a29219d26adcf4c468a90c095fedcf951c24d7b820075ac391f3adfdd83e996a6a5a3fad919b5ef475645bbc9
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3824 crap2.exe 3824 crap2.exe 3824 crap2.exe 3824 crap2.exe 3824 crap2.exe 3824 crap2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3824 crap2.exe Token: SeCreatePagefilePrivilege 3824 crap2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3824 crap2.exe 3824 crap2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 1028 3824 crap2.exe 66 PID 3824 wrote to memory of 1028 3824 crap2.exe 66 PID 3824 wrote to memory of 1028 3824 crap2.exe 66 -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS crap2.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS crap2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 crap2.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 crap2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\crap2.exe"C:\Users\Admin\AppData\Local\Temp\crap2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Enumerates system info in registry
- Checks processor information in registry
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\crap2.exe"C:\Users\Admin\AppData\Local\Temp\crap2.exe" /_ShowProgress /mnl2⤵PID:1028
-