Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 06:39
Static task
static1
Behavioral task
behavioral1
Sample
Pictures.jpg.scr
Resource
win7
Behavioral task
behavioral2
Sample
Pictures.jpg.scr
Resource
win10v200430
General
-
Target
Pictures.jpg.scr
-
Size
710KB
-
MD5
281198c4b0cf5277fb57896af997ada3
-
SHA1
3066e53d111ee159ece9ecd4edc977a1a38decc5
-
SHA256
6e9b80abff99f9ce1d477c30f23c7ab327c1d5fef3edda5f68497aacd35ae03b
-
SHA512
334e2cc90289c1a79fdbbd115397a1a6f888aa370f9059ef3783fe984f6e844cac1615a41932c458a2cab24e39d7a0cb81cd5cb8465e9c18056b879095f118b8
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Pictures.jpg.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Pictures.jpg.scr -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Pictures.jpg.scr Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Pictures.jpg.scr -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1936 1508 Pictures.jpg.scr 27 PID 1508 wrote to memory of 1936 1508 Pictures.jpg.scr 27 PID 1508 wrote to memory of 1936 1508 Pictures.jpg.scr 27 PID 1508 wrote to memory of 1936 1508 Pictures.jpg.scr 27 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1508 wrote to memory of 1588 1508 Pictures.jpg.scr 29 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 2012 1588 MSBuild.exe 30 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 PID 1588 wrote to memory of 1428 1588 MSBuild.exe 31 -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1508 set thread context of 1588 1508 Pictures.jpg.scr 29 PID 1588 set thread context of 2012 1588 MSBuild.exe 30 PID 1588 set thread context of 1428 1588 MSBuild.exe 31 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1588 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1588 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1588 MSBuild.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1936 schtasks.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 whatismyipaddress.com 8 whatismyipaddress.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pictures.jpg.scr"C:\Users\Admin\AppData\Local\Temp\Pictures.jpg.scr" /S1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vTbjPEGI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2FF5.tmp"2⤵
- Creates scheduled task(s)
PID:1936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵PID:2012
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵PID:1428
-
-