Analysis
-
max time kernel
128s -
max time network
114s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
31-07-2020 14:50
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe
Resource
win10v200722
General
-
Target
SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe
-
Size
143KB
-
MD5
df55c9b32a24d8d847ca3580488cab96
-
SHA1
44962f29fcb30d3efbb3477f144f065ab60e9b08
-
SHA256
2c266a9a9c74705680c09276003465f35878052e5d0f6d9c79383a31aed6822e
-
SHA512
349895726d6757df2431d6224e154d3ec660711cb30a131717d24a192c797ce3041c46de8880ceeed1452e4e5e5e43a8127e9966810ff535f37e0d94dc632fab
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
Processes:
SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exeovsk.exemsjgli.exedescription ioc process File created C:\Windows\Tasks\ovsk.job SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe File opened for modification C:\Windows\Tasks\ovsk.job SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe File created C:\Windows\Tasks\slsvotbpupkexhcupks.job ovsk.exe File created C:\Windows\Tasks\tooft.job msjgli.exe File opened for modification C:\Windows\Tasks\tooft.job msjgli.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org 4 api.ipify.org -
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 508 3888 WerFault.exe SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe 3904 812 WerFault.exe ovsk.exe 2536 812 WerFault.exe ovsk.exe 388 3888 WerFault.exe SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe 3288 3888 WerFault.exe SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe 2988 812 WerFault.exe ovsk.exe 3800 812 WerFault.exe ovsk.exe 664 3788 WerFault.exe msjgli.exe 576 812 WerFault.exe ovsk.exe 4004 3896 WerFault.exe tooft.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 508 WerFault.exe Token: SeBackupPrivilege 508 WerFault.exe Token: SeDebugPrivilege 508 WerFault.exe Token: SeDebugPrivilege 3904 WerFault.exe Token: SeDebugPrivilege 2536 WerFault.exe Token: SeDebugPrivilege 388 WerFault.exe Token: SeDebugPrivilege 3288 WerFault.exe Token: SeDebugPrivilege 2988 WerFault.exe Token: SeDebugPrivilege 3800 WerFault.exe Token: SeDebugPrivilege 576 WerFault.exe Token: SeDebugPrivilege 664 WerFault.exe Token: SeDebugPrivilege 4004 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 134 IoCs
Processes:
WerFault.exeSecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 3888 SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe 3888 SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 388 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe 3288 WerFault.exe -
Executes dropped EXE 3 IoCs
Processes:
ovsk.exemsjgli.exetooft.exepid process 812 ovsk.exe 3788 msjgli.exe 3896 tooft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.df55c9b32a24d8d8.14207.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 5482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 8642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 8762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\otbbl\ovsk.exeC:\ProgramData\otbbl\ovsk.exe start1⤵
- Drops file in Windows directory
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 5402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 8002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 8802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 9002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 5482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\TEMP\msjgli.exeC:\Windows\TEMP\msjgli.exe1⤵
- Drops file in Windows directory
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 5362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\gsiciw\tooft.exeC:\ProgramData\gsiciw\tooft.exe start1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 5402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\gsiciw\tooft.exe
-
C:\ProgramData\gsiciw\tooft.exe
-
C:\ProgramData\otbbl\ovsk.exe
-
C:\ProgramData\otbbl\ovsk.exe
-
C:\Windows\TEMP\msjgli.exe
-
C:\Windows\Tasks\ovsk.job
-
C:\Windows\Temp\msjgli.exe
-
memory/388-18-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/388-21-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/508-2-0x0000000004520000-0x0000000004521000-memory.dmpFilesize
4KB
-
memory/508-3-0x0000000004520000-0x0000000004521000-memory.dmpFilesize
4KB
-
memory/576-61-0x0000000004270000-0x0000000004271000-memory.dmpFilesize
4KB
-
memory/576-60-0x0000000003C00000-0x0000000003C01000-memory.dmpFilesize
4KB
-
memory/576-55-0x0000000003800000-0x0000000003801000-memory.dmpFilesize
4KB
-
memory/664-57-0x0000000003AC0000-0x0000000003AC1000-memory.dmpFilesize
4KB
-
memory/664-62-0x00000000042F0000-0x00000000042F1000-memory.dmpFilesize
4KB
-
memory/664-54-0x0000000003AC0000-0x0000000003AC1000-memory.dmpFilesize
4KB
-
memory/812-8-0x000000000349C000-0x000000000349D000-memory.dmpFilesize
4KB
-
memory/812-9-0x0000000003DD0000-0x0000000003DD1000-memory.dmpFilesize
4KB
-
memory/2536-14-0x0000000002DB0000-0x0000000002DB1000-memory.dmpFilesize
4KB
-
memory/2536-17-0x0000000003460000-0x0000000003461000-memory.dmpFilesize
4KB
-
memory/2988-29-0x00000000036F0000-0x00000000036F1000-memory.dmpFilesize
4KB
-
memory/2988-32-0x0000000003D20000-0x0000000003D21000-memory.dmpFilesize
4KB
-
memory/3288-25-0x00000000055B0000-0x00000000055B1000-memory.dmpFilesize
4KB
-
memory/3288-22-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/3788-52-0x0000000003E80000-0x0000000003E81000-memory.dmpFilesize
4KB
-
memory/3788-51-0x000000000359C000-0x000000000359D000-memory.dmpFilesize
4KB
-
memory/3800-33-0x0000000003020000-0x0000000003021000-memory.dmpFilesize
4KB
-
memory/3888-0-0x00000000033D2000-0x00000000033D3000-memory.dmpFilesize
4KB
-
memory/3888-1-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/3896-65-0x000000000359C000-0x000000000359D000-memory.dmpFilesize
4KB
-
memory/3896-66-0x0000000003DA0000-0x0000000003DA1000-memory.dmpFilesize
4KB
-
memory/3904-13-0x0000000003530000-0x0000000003531000-memory.dmpFilesize
4KB
-
memory/3904-10-0x0000000002E80000-0x0000000002E81000-memory.dmpFilesize
4KB
-
memory/4004-67-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/4004-70-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB