Analysis
-
max time kernel
7s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 16:48
Static task
static1
Behavioral task
behavioral1
Sample
action_2.0.8.9.vir.exe
Resource
win7
Behavioral task
behavioral2
Sample
action_2.0.8.9.vir.exe
Resource
win10v200430
Errors
General
-
Target
action_2.0.8.9.vir.exe
-
Size
380KB
-
MD5
11b3ae60c845189bbec476f762476e69
-
SHA1
28461e56f09813363ccc1fa686e48938afde7ec4
-
SHA256
b6f0422e0ce7fd8f2ad23bc2ff2fab72b331e252810ce7a4582217a3bea32c67
-
SHA512
4b235b560f0cd9d011017aec3ccbe5636a3c78905ecc401403ec2e01db809bfa3c4ecf973615ded1b54041c7e0a572ac9e6031fd56615a3621d4a9351c40c88e
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
action_2.0.8.9.vir.exeteroq.exedescription pid process Token: SeSecurityPrivilege 1156 action_2.0.8.9.vir.exe Token: SeShutdownPrivilege 1240 teroq.exe -
Loads dropped DLL 2 IoCs
Processes:
action_2.0.8.9.vir.exepid process 1156 action_2.0.8.9.vir.exe 1156 action_2.0.8.9.vir.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
action_2.0.8.9.vir.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\Currentversion\Run action_2.0.8.9.vir.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\{48CDB708-3EC4-A593-221B-638300B5B725} = "C:\\Users\\Admin\\AppData\\Roaming\\Avbuug\\teroq.exe" action_2.0.8.9.vir.exe -
Stops running service(s) 3 TTPs
-
Processes:
mstsc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" mstsc.exe -
Suspicious use of WriteProcessMemory 125 IoCs
Processes:
action_2.0.8.9.vir.exeteroq.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1156 wrote to memory of 1240 1156 action_2.0.8.9.vir.exe teroq.exe PID 1156 wrote to memory of 1240 1156 action_2.0.8.9.vir.exe teroq.exe PID 1156 wrote to memory of 1240 1156 action_2.0.8.9.vir.exe teroq.exe PID 1156 wrote to memory of 1240 1156 action_2.0.8.9.vir.exe teroq.exe PID 1240 wrote to memory of 1244 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1244 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1244 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1244 1240 teroq.exe cmd.exe PID 1156 wrote to memory of 1444 1156 action_2.0.8.9.vir.exe cmd.exe PID 1156 wrote to memory of 1444 1156 action_2.0.8.9.vir.exe cmd.exe PID 1156 wrote to memory of 1444 1156 action_2.0.8.9.vir.exe cmd.exe PID 1156 wrote to memory of 1444 1156 action_2.0.8.9.vir.exe cmd.exe PID 1244 wrote to memory of 932 1244 cmd.exe sc.exe PID 1244 wrote to memory of 932 1244 cmd.exe sc.exe PID 1244 wrote to memory of 932 1244 cmd.exe sc.exe PID 1244 wrote to memory of 932 1244 cmd.exe sc.exe PID 1240 wrote to memory of 836 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 836 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 836 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 836 1240 teroq.exe cmd.exe PID 836 wrote to memory of 456 836 cmd.exe sc.exe PID 836 wrote to memory of 456 836 cmd.exe sc.exe PID 836 wrote to memory of 456 836 cmd.exe sc.exe PID 836 wrote to memory of 456 836 cmd.exe sc.exe PID 1240 wrote to memory of 1068 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1068 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1068 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1068 1240 teroq.exe cmd.exe PID 1068 wrote to memory of 1552 1068 cmd.exe sc.exe PID 1068 wrote to memory of 1552 1068 cmd.exe sc.exe PID 1068 wrote to memory of 1552 1068 cmd.exe sc.exe PID 1068 wrote to memory of 1552 1068 cmd.exe sc.exe PID 1240 wrote to memory of 1520 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1520 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1520 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1520 1240 teroq.exe cmd.exe PID 1520 wrote to memory of 1328 1520 cmd.exe sc.exe PID 1520 wrote to memory of 1328 1520 cmd.exe sc.exe PID 1520 wrote to memory of 1328 1520 cmd.exe sc.exe PID 1520 wrote to memory of 1328 1520 cmd.exe sc.exe PID 1240 wrote to memory of 1832 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1832 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1832 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1832 1240 teroq.exe cmd.exe PID 1832 wrote to memory of 1796 1832 cmd.exe sc.exe PID 1832 wrote to memory of 1796 1832 cmd.exe sc.exe PID 1832 wrote to memory of 1796 1832 cmd.exe sc.exe PID 1832 wrote to memory of 1796 1832 cmd.exe sc.exe PID 1240 wrote to memory of 1692 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1692 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1692 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1692 1240 teroq.exe cmd.exe PID 1692 wrote to memory of 1612 1692 cmd.exe sc.exe PID 1692 wrote to memory of 1612 1692 cmd.exe sc.exe PID 1692 wrote to memory of 1612 1692 cmd.exe sc.exe PID 1692 wrote to memory of 1612 1692 cmd.exe sc.exe PID 1240 wrote to memory of 1660 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1660 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1660 1240 teroq.exe cmd.exe PID 1240 wrote to memory of 1660 1240 teroq.exe cmd.exe PID 1660 wrote to memory of 1576 1660 cmd.exe sc.exe PID 1660 wrote to memory of 1576 1660 cmd.exe sc.exe PID 1660 wrote to memory of 1576 1660 cmd.exe sc.exe PID 1660 wrote to memory of 1576 1660 cmd.exe sc.exe -
Executes dropped EXE 1 IoCs
Processes:
teroq.exepid process 1240 teroq.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1444 cmd.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
Processes
-
C:\Users\Admin\AppData\Local\Temp\action_2.0.8.9.vir.exe"C:\Users\Admin\AppData\Local\Temp\action_2.0.8.9.vir.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Avbuug\teroq.exe"C:\Users\Admin\AppData\Roaming\Avbuug\teroq.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop wuauserv3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc config wuauserv start= disabled3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop wscsvc4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc config wscsvc start= disabled3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc config WinDefend start= disabled3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop WdNisSvc3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WdNisSvc4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc config WdNisSvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc config WdNisSvc start= disabled4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc stop MpsSvc3⤵
-
C:\Windows\SysWOW64\sc.exesc stop MpsSvc4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc config MpsSvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled4⤵
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"3⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp9f3bf52b.bat" C:\Users\Admin\AppData\Local\Temp\action_2.0.8.9.vir.exe"2⤵
- Deletes itself
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9f3bf52b.bat
-
C:\Users\Admin\AppData\Roaming\Avbuug\teroq.exe
-
\Users\Admin\AppData\Roaming\Avbuug\teroq.exe
-
\Users\Admin\AppData\Roaming\Avbuug\teroq.exe
-
memory/368-29-0x0000000000000000-mapping.dmp
-
memory/456-11-0x0000000000000000-mapping.dmp
-
memory/564-31-0x0000000000000000-mapping.dmp
-
memory/808-30-0x0000000000000000-mapping.dmp
-
memory/836-10-0x0000000000000000-mapping.dmp
-
memory/932-9-0x0000000000000000-mapping.dmp
-
memory/1068-12-0x0000000000000000-mapping.dmp
-
memory/1092-32-0x0000000000000000-mapping.dmp
-
memory/1156-0-0x00000000005DF000-0x00000000005E0000-memory.dmpFilesize
4KB
-
memory/1184-34-0x0000000000000000-mapping.dmp
-
memory/1192-36-0x0000000000080000-0x00000000000CD000-memory.dmpFilesize
308KB
-
memory/1192-37-0x0000000000080000-0x00000000000CD000-memory.dmpFilesize
308KB
-
memory/1192-38-0x0000000000000000-mapping.dmp
-
memory/1240-5-0x00000000002EE000-0x00000000002EF000-memory.dmpFilesize
4KB
-
memory/1240-3-0x0000000000000000-mapping.dmp
-
memory/1244-6-0x0000000000000000-mapping.dmp
-
memory/1328-15-0x0000000000000000-mapping.dmp
-
memory/1444-7-0x0000000000000000-mapping.dmp
-
memory/1520-14-0x0000000000000000-mapping.dmp
-
memory/1552-13-0x0000000000000000-mapping.dmp
-
memory/1576-21-0x0000000000000000-mapping.dmp
-
memory/1584-35-0x0000000000000000-mapping.dmp
-
memory/1612-19-0x0000000000000000-mapping.dmp
-
memory/1660-20-0x0000000000000000-mapping.dmp
-
memory/1692-18-0x0000000000000000-mapping.dmp
-
memory/1796-17-0x0000000000000000-mapping.dmp
-
memory/1832-16-0x0000000000000000-mapping.dmp
-
memory/1844-23-0x0000000000000000-mapping.dmp
-
memory/1900-24-0x0000000000000000-mapping.dmp
-
memory/1904-22-0x0000000000000000-mapping.dmp
-
memory/1908-26-0x0000000000000000-mapping.dmp
-
memory/1932-25-0x0000000000000000-mapping.dmp
-
memory/1976-28-0x0000000000000000-mapping.dmp
-
memory/2016-33-0x0000000000000000-mapping.dmp
-
memory/2040-27-0x0000000000000000-mapping.dmp