Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
09-08-2020 13:28
Static task
static1
Behavioral task
behavioral1
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win7v200722
Behavioral task
behavioral2
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win10
General
-
Target
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
-
Size
155KB
-
MD5
cd57e5511bb7c0390eb83b772c84de65
-
SHA1
5c6e3c717dfab4b0eb3ddfa6f3062355823f2088
-
SHA256
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397
-
SHA512
036e4ded92ed1ee28ab79dfd19116c7b86fac5c3a9ca5cc7f92f4cbd5b4a4771a6dc01af93a5b65d53a0367dd684eb52bb81a51621baa56e84cbd4007406d362
Malware Config
Signatures
-
Blacklisted process makes network request 18 IoCs
flow pid Process 11 1696 msiexec.exe 12 1696 msiexec.exe 13 1696 msiexec.exe 14 1696 msiexec.exe 15 1696 msiexec.exe 16 1696 msiexec.exe 17 1696 msiexec.exe 18 1696 msiexec.exe 19 1696 msiexec.exe 21 1696 msiexec.exe 22 1696 msiexec.exe 23 1696 msiexec.exe 24 1696 msiexec.exe 25 1696 msiexec.exe 26 1696 msiexec.exe 27 1696 msiexec.exe 28 1696 msiexec.exe 29 1696 msiexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ocuwu = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Zalo\\inpa.dll" msiexec.exe -
Modifies service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas ipconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs ipconfig.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1056 set thread context of 1696 1056 rundll32.exe 25 -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 1576 net.exe 1548 net.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 824 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 msiexec.exe 1696 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1696 msiexec.exe Token: SeSecurityPrivilege 1696 msiexec.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 748 wrote to memory of 1056 748 rundll32.exe 24 PID 748 wrote to memory of 1056 748 rundll32.exe 24 PID 748 wrote to memory of 1056 748 rundll32.exe 24 PID 748 wrote to memory of 1056 748 rundll32.exe 24 PID 748 wrote to memory of 1056 748 rundll32.exe 24 PID 748 wrote to memory of 1056 748 rundll32.exe 24 PID 748 wrote to memory of 1056 748 rundll32.exe 24 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1056 wrote to memory of 1696 1056 rundll32.exe 25 PID 1696 wrote to memory of 2000 1696 msiexec.exe 32 PID 1696 wrote to memory of 2000 1696 msiexec.exe 32 PID 1696 wrote to memory of 2000 1696 msiexec.exe 32 PID 1696 wrote to memory of 2000 1696 msiexec.exe 32 PID 2000 wrote to memory of 824 2000 cmd.exe 34 PID 2000 wrote to memory of 824 2000 cmd.exe 34 PID 2000 wrote to memory of 824 2000 cmd.exe 34 PID 2000 wrote to memory of 824 2000 cmd.exe 34 PID 1696 wrote to memory of 1060 1696 msiexec.exe 35 PID 1696 wrote to memory of 1060 1696 msiexec.exe 35 PID 1696 wrote to memory of 1060 1696 msiexec.exe 35 PID 1696 wrote to memory of 1060 1696 msiexec.exe 35 PID 1060 wrote to memory of 1456 1060 cmd.exe 37 PID 1060 wrote to memory of 1456 1060 cmd.exe 37 PID 1060 wrote to memory of 1456 1060 cmd.exe 37 PID 1060 wrote to memory of 1456 1060 cmd.exe 37 PID 1456 wrote to memory of 788 1456 net.exe 38 PID 1456 wrote to memory of 788 1456 net.exe 38 PID 1456 wrote to memory of 788 1456 net.exe 38 PID 1456 wrote to memory of 788 1456 net.exe 38 PID 1696 wrote to memory of 992 1696 msiexec.exe 39 PID 1696 wrote to memory of 992 1696 msiexec.exe 39 PID 1696 wrote to memory of 992 1696 msiexec.exe 39 PID 1696 wrote to memory of 992 1696 msiexec.exe 39 PID 992 wrote to memory of 1576 992 cmd.exe 42 PID 992 wrote to memory of 1576 992 cmd.exe 42 PID 992 wrote to memory of 1576 992 cmd.exe 42 PID 992 wrote to memory of 1576 992 cmd.exe 42 PID 1696 wrote to memory of 1748 1696 msiexec.exe 43 PID 1696 wrote to memory of 1748 1696 msiexec.exe 43 PID 1696 wrote to memory of 1748 1696 msiexec.exe 43 PID 1696 wrote to memory of 1748 1696 msiexec.exe 43 PID 1748 wrote to memory of 1548 1748 cmd.exe 45 PID 1748 wrote to memory of 1548 1748 cmd.exe 45 PID 1748 wrote to memory of 1548 1748 cmd.exe 45 PID 1748 wrote to memory of 1548 1748 cmd.exe 45
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Modifies service
- Gathers network information
PID:824
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\net.exenet config workstation5⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:788
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:1548
-
-
-
-