Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
09-08-2020 13:28
Static task
static1
Behavioral task
behavioral1
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win7v200722
Behavioral task
behavioral2
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win10
General
-
Target
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
-
Size
155KB
-
MD5
cd57e5511bb7c0390eb83b772c84de65
-
SHA1
5c6e3c717dfab4b0eb3ddfa6f3062355823f2088
-
SHA256
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397
-
SHA512
036e4ded92ed1ee28ab79dfd19116c7b86fac5c3a9ca5cc7f92f4cbd5b4a4771a6dc01af93a5b65d53a0367dd684eb52bb81a51621baa56e84cbd4007406d362
Malware Config
Signatures
-
Blacklisted process makes network request 18 IoCs
Processes:
msiexec.exeflow pid process 11 1696 msiexec.exe 12 1696 msiexec.exe 13 1696 msiexec.exe 14 1696 msiexec.exe 15 1696 msiexec.exe 16 1696 msiexec.exe 17 1696 msiexec.exe 18 1696 msiexec.exe 19 1696 msiexec.exe 21 1696 msiexec.exe 22 1696 msiexec.exe 23 1696 msiexec.exe 24 1696 msiexec.exe 25 1696 msiexec.exe 26 1696 msiexec.exe 27 1696 msiexec.exe 28 1696 msiexec.exe 29 1696 msiexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ocuwu = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Zalo\\inpa.dll" msiexec.exe -
Modifies service 2 TTPs 2 IoCs
Processes:
ipconfig.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas ipconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs ipconfig.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1056 set thread context of 1696 1056 rundll32.exe msiexec.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 824 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 1696 msiexec.exe 1696 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1696 msiexec.exe Token: SeSecurityPrivilege 1696 msiexec.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
rundll32.exerundll32.exemsiexec.execmd.execmd.exenet.execmd.execmd.exedescription pid process target process PID 748 wrote to memory of 1056 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1056 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1056 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1056 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1056 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1056 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1056 748 rundll32.exe rundll32.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1056 wrote to memory of 1696 1056 rundll32.exe msiexec.exe PID 1696 wrote to memory of 2000 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 2000 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 2000 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 2000 1696 msiexec.exe cmd.exe PID 2000 wrote to memory of 824 2000 cmd.exe ipconfig.exe PID 2000 wrote to memory of 824 2000 cmd.exe ipconfig.exe PID 2000 wrote to memory of 824 2000 cmd.exe ipconfig.exe PID 2000 wrote to memory of 824 2000 cmd.exe ipconfig.exe PID 1696 wrote to memory of 1060 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 1060 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 1060 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 1060 1696 msiexec.exe cmd.exe PID 1060 wrote to memory of 1456 1060 cmd.exe net.exe PID 1060 wrote to memory of 1456 1060 cmd.exe net.exe PID 1060 wrote to memory of 1456 1060 cmd.exe net.exe PID 1060 wrote to memory of 1456 1060 cmd.exe net.exe PID 1456 wrote to memory of 788 1456 net.exe net1.exe PID 1456 wrote to memory of 788 1456 net.exe net1.exe PID 1456 wrote to memory of 788 1456 net.exe net1.exe PID 1456 wrote to memory of 788 1456 net.exe net1.exe PID 1696 wrote to memory of 992 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 992 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 992 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 992 1696 msiexec.exe cmd.exe PID 992 wrote to memory of 1576 992 cmd.exe net.exe PID 992 wrote to memory of 1576 992 cmd.exe net.exe PID 992 wrote to memory of 1576 992 cmd.exe net.exe PID 992 wrote to memory of 1576 992 cmd.exe net.exe PID 1696 wrote to memory of 1748 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 1748 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 1748 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 1748 1696 msiexec.exe cmd.exe PID 1748 wrote to memory of 1548 1748 cmd.exe net.exe PID 1748 wrote to memory of 1548 1748 cmd.exe net.exe PID 1748 wrote to memory of 1548 1748 cmd.exe net.exe PID 1748 wrote to memory of 1548 1748 cmd.exe net.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Modifies service
- Gathers network information
PID:824
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\net.exenet config workstation5⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:788
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:1548
-
-
-
-