Analysis
-
max time kernel
125s -
max time network
31s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
03-08-2020 14:09
Static task
static1
Behavioral task
behavioral1
Sample
cbc399f8957918ca58b540080687665e.bin.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
cbc399f8957918ca58b540080687665e.bin.exe
Resource
win10
General
-
Target
cbc399f8957918ca58b540080687665e.bin.exe
-
Size
604KB
-
MD5
cbc399f8957918ca58b540080687665e
-
SHA1
66fd6764a289bbd0c070f2868b9b3dfcaf189870
-
SHA256
2b330d2eea637a524621dca0b18db45b53d7542d21323afed1f454f3437c4d3e
-
SHA512
a795587c0529e5119e81edfb7ef3480bcd2a6ef5a9e8d4982c4edcd2fdaf66fb77ed0528bc6ce13f3b3667fb6364b4710b8dc5c5843afd11ed982877ee1bf84f
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cbc399f8957918ca58b540080687665e.bin.exeExplorer.EXEpid process 1240 cbc399f8957918ca58b540080687665e.bin.exe 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
cbc399f8957918ca58b540080687665e.bin.execontrol.exeExplorer.EXEcmd.exedescription pid process target process PID 1240 wrote to memory of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1240 wrote to memory of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1240 wrote to memory of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1240 wrote to memory of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1240 wrote to memory of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1240 wrote to memory of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1240 wrote to memory of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1424 wrote to memory of 1244 1424 control.exe Explorer.EXE PID 1424 wrote to memory of 1244 1424 control.exe Explorer.EXE PID 1424 wrote to memory of 1244 1424 control.exe Explorer.EXE PID 1424 wrote to memory of 452 1424 control.exe rundll32.exe PID 1424 wrote to memory of 452 1424 control.exe rundll32.exe PID 1424 wrote to memory of 452 1424 control.exe rundll32.exe PID 1424 wrote to memory of 452 1424 control.exe rundll32.exe PID 1244 wrote to memory of 1056 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1056 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1056 1244 Explorer.EXE cmd.exe PID 1056 wrote to memory of 1044 1056 cmd.exe nslookup.exe PID 1056 wrote to memory of 1044 1056 cmd.exe nslookup.exe PID 1056 wrote to memory of 1044 1056 cmd.exe nslookup.exe PID 1244 wrote to memory of 1524 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1524 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1524 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1832 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1832 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1832 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1832 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1832 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1832 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1832 1244 Explorer.EXE cmd.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
cbc399f8957918ca58b540080687665e.bin.execontrol.exeExplorer.EXEpid process 1240 cbc399f8957918ca58b540080687665e.bin.exe 1424 control.exe 1424 control.exe 1244 Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
Processes:
cbc399f8957918ca58b540080687665e.bin.execontrol.exeExplorer.EXEdescription pid process target process PID 1240 set thread context of 1424 1240 cbc399f8957918ca58b540080687665e.bin.exe control.exe PID 1424 set thread context of 1244 1424 control.exe Explorer.EXE PID 1424 set thread context of 452 1424 control.exe rundll32.exe PID 1244 set thread context of 1832 1244 Explorer.EXE cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\activoas = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\BioCrepl\\DDORsdmo.exe" Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\cbc399f8957918ca58b540080687665e.bin.exe"C:\Users\Admin\AppData\Local\Temp\cbc399f8957918ca58b540080687665e.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1240 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?3⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1424 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?4⤵PID:452
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\D4A0.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1044
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\D4A0.bi1"2⤵PID:1524
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1832
-