Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
19-07-2020 19:37
Static task
static1
Behavioral task
behavioral1
Sample
uncategorized_0.5.4.3.vir.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
uncategorized_0.5.4.3.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
uncategorized_0.5.4.3.vir.exe
-
Size
139KB
-
MD5
4645ee774d4191213ba90469f765b200
-
SHA1
b3510f9c344145c10c10117f56e30ebd534b425e
-
SHA256
a45341621c1e3e058096ae5b6829202aadb5bfd4b06dfa4a9e66249d2db500c9
-
SHA512
affb42ce81b55a7744f325b32c8c8c733fa2446e5debcb63a429ddd5290ca73f108744a00a555b8dc714ec1a3b659e372581390e9978b9b4f6382c49ff309fef
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
yfar.exeyfar.exepid process 752 yfar.exe 1640 yfar.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
yfar.exepid process 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe 1640 yfar.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1100 cmd.exe -
Processes:
uncategorized_0.5.4.3.vir.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Privacy uncategorized_0.5.4.3.vir.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" uncategorized_0.5.4.3.vir.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
uncategorized_0.5.4.3.vir.exeuncategorized_0.5.4.3.vir.exeyfar.exeyfar.exedescription pid process target process PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1068 wrote to memory of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 1328 wrote to memory of 752 1328 uncategorized_0.5.4.3.vir.exe yfar.exe PID 1328 wrote to memory of 752 1328 uncategorized_0.5.4.3.vir.exe yfar.exe PID 1328 wrote to memory of 752 1328 uncategorized_0.5.4.3.vir.exe yfar.exe PID 1328 wrote to memory of 752 1328 uncategorized_0.5.4.3.vir.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 752 wrote to memory of 1640 752 yfar.exe yfar.exe PID 1640 wrote to memory of 1172 1640 yfar.exe taskhost.exe PID 1640 wrote to memory of 1172 1640 yfar.exe taskhost.exe PID 1640 wrote to memory of 1172 1640 yfar.exe taskhost.exe PID 1640 wrote to memory of 1172 1640 yfar.exe taskhost.exe PID 1640 wrote to memory of 1172 1640 yfar.exe taskhost.exe PID 1640 wrote to memory of 1260 1640 yfar.exe Dwm.exe PID 1640 wrote to memory of 1260 1640 yfar.exe Dwm.exe PID 1640 wrote to memory of 1260 1640 yfar.exe Dwm.exe PID 1640 wrote to memory of 1260 1640 yfar.exe Dwm.exe PID 1640 wrote to memory of 1260 1640 yfar.exe Dwm.exe PID 1640 wrote to memory of 1296 1640 yfar.exe Explorer.EXE PID 1640 wrote to memory of 1296 1640 yfar.exe Explorer.EXE PID 1640 wrote to memory of 1296 1640 yfar.exe Explorer.EXE PID 1640 wrote to memory of 1296 1640 yfar.exe Explorer.EXE PID 1640 wrote to memory of 1296 1640 yfar.exe Explorer.EXE PID 1640 wrote to memory of 1328 1640 yfar.exe uncategorized_0.5.4.3.vir.exe PID 1640 wrote to memory of 1328 1640 yfar.exe uncategorized_0.5.4.3.vir.exe PID 1640 wrote to memory of 1328 1640 yfar.exe uncategorized_0.5.4.3.vir.exe PID 1640 wrote to memory of 1328 1640 yfar.exe uncategorized_0.5.4.3.vir.exe PID 1640 wrote to memory of 1328 1640 yfar.exe uncategorized_0.5.4.3.vir.exe PID 1328 wrote to memory of 1100 1328 uncategorized_0.5.4.3.vir.exe cmd.exe PID 1328 wrote to memory of 1100 1328 uncategorized_0.5.4.3.vir.exe cmd.exe PID 1328 wrote to memory of 1100 1328 uncategorized_0.5.4.3.vir.exe cmd.exe PID 1328 wrote to memory of 1100 1328 uncategorized_0.5.4.3.vir.exe cmd.exe PID 1640 wrote to memory of 1100 1640 yfar.exe cmd.exe PID 1640 wrote to memory of 1100 1640 yfar.exe cmd.exe PID 1640 wrote to memory of 1100 1640 yfar.exe cmd.exe PID 1640 wrote to memory of 1100 1640 yfar.exe cmd.exe PID 1640 wrote to memory of 1100 1640 yfar.exe cmd.exe PID 1640 wrote to memory of 1700 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1700 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1700 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1700 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1700 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1760 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1760 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1760 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1760 1640 yfar.exe DllHost.exe PID 1640 wrote to memory of 1760 1640 yfar.exe DllHost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
uncategorized_0.5.4.3.vir.exedescription pid process Token: SeSecurityPrivilege 1328 uncategorized_0.5.4.3.vir.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
yfar.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\Currentversion\Run yfar.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\|375D9B2B-11DC-1C1B-3AC8-5525E43598AD} = "C:\\Users\\Admin\\AppData\\Roaming\\Viarx\\yfar.exe" yfar.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
uncategorized_0.5.4.3.vir.exeyfar.exedescription pid process target process PID 1068 set thread context of 1328 1068 uncategorized_0.5.4.3.vir.exe uncategorized_0.5.4.3.vir.exe PID 752 set thread context of 1640 752 yfar.exe yfar.exe -
Loads dropped DLL 2 IoCs
Processes:
uncategorized_0.5.4.3.vir.exepid process 1328 uncategorized_0.5.4.3.vir.exe 1328 uncategorized_0.5.4.3.vir.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\uncategorized_0.5.4.3.vir.exe"C:\Users\Admin\AppData\Local\Temp\uncategorized_0.5.4.3.vir.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\uncategorized_0.5.4.3.vir.exeC:\Users\Admin\AppData\Local\Temp\uncategorized_0.5.4.3.vir.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Viarx\yfar.exe"C:\Users\Admin\AppData\Roaming\Viarx\yfar.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Viarx\yfar.exeC:\Users\Admin\AppData\Roaming\Viarx\yfar.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc4c28423.bat"4⤵
- Deletes itself
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpc4c28423.bat
-
C:\Users\Admin\AppData\Roaming\Viarx\yfar.exe
-
C:\Users\Admin\AppData\Roaming\Viarx\yfar.exe
-
C:\Users\Admin\AppData\Roaming\Viarx\yfar.exe
-
\Users\Admin\AppData\Roaming\Viarx\yfar.exe
-
\Users\Admin\AppData\Roaming\Viarx\yfar.exe
-
memory/752-5-0x0000000000000000-mapping.dmp
-
memory/1100-13-0x0000000000000000-mapping.dmp
-
memory/1100-14-0x0000000000000000-mapping.dmp
-
memory/1328-0-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1328-2-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1328-12-0x00000000004177F2-mapping.dmp
-
memory/1328-1-0x00000000004177F2-mapping.dmp
-
memory/1640-9-0x00000000004177F2-mapping.dmp
-
memory/1640-16-0x0000000003080000-0x0000000003081000-memory.dmpFilesize
4KB