Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
09-08-2020 13:28
Static task
static1
Behavioral task
behavioral1
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win7v200722
Behavioral task
behavioral2
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win10
General
-
Target
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
-
Size
155KB
-
MD5
cd57e5511bb7c0390eb83b772c84de65
-
SHA1
5c6e3c717dfab4b0eb3ddfa6f3062355823f2088
-
SHA256
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397
-
SHA512
036e4ded92ed1ee28ab79dfd19116c7b86fac5c3a9ca5cc7f92f4cbd5b4a4771a6dc01af93a5b65d53a0367dd684eb52bb81a51621baa56e84cbd4007406d362
Malware Config
Signatures
-
Blacklisted process makes network request 18 IoCs
flow pid Process 14 3904 msiexec.exe 15 3904 msiexec.exe 16 3904 msiexec.exe 17 3904 msiexec.exe 18 3904 msiexec.exe 19 3904 msiexec.exe 20 3904 msiexec.exe 21 3904 msiexec.exe 22 3904 msiexec.exe 24 3904 msiexec.exe 25 3904 msiexec.exe 27 3904 msiexec.exe 28 3904 msiexec.exe 29 3904 msiexec.exe 31 3904 msiexec.exe 40 3904 msiexec.exe 41 3904 msiexec.exe 42 3904 msiexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yqpesue = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Tyumal\\anxa.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3880 set thread context of 3904 3880 rundll32.exe 68 -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 3668 net.exe 3352 net.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 392 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3904 msiexec.exe 3904 msiexec.exe 3904 msiexec.exe 3904 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3904 msiexec.exe Token: SeSecurityPrivilege 3904 msiexec.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 3832 wrote to memory of 3880 3832 rundll32.exe 67 PID 3832 wrote to memory of 3880 3832 rundll32.exe 67 PID 3832 wrote to memory of 3880 3832 rundll32.exe 67 PID 3880 wrote to memory of 3904 3880 rundll32.exe 68 PID 3880 wrote to memory of 3904 3880 rundll32.exe 68 PID 3880 wrote to memory of 3904 3880 rundll32.exe 68 PID 3880 wrote to memory of 3904 3880 rundll32.exe 68 PID 3880 wrote to memory of 3904 3880 rundll32.exe 68 PID 3904 wrote to memory of 4016 3904 msiexec.exe 69 PID 3904 wrote to memory of 4016 3904 msiexec.exe 69 PID 3904 wrote to memory of 4016 3904 msiexec.exe 69 PID 4016 wrote to memory of 392 4016 cmd.exe 71 PID 4016 wrote to memory of 392 4016 cmd.exe 71 PID 4016 wrote to memory of 392 4016 cmd.exe 71 PID 3904 wrote to memory of 732 3904 msiexec.exe 72 PID 3904 wrote to memory of 732 3904 msiexec.exe 72 PID 3904 wrote to memory of 732 3904 msiexec.exe 72 PID 732 wrote to memory of 2868 732 cmd.exe 74 PID 732 wrote to memory of 2868 732 cmd.exe 74 PID 732 wrote to memory of 2868 732 cmd.exe 74 PID 2868 wrote to memory of 3044 2868 net.exe 75 PID 2868 wrote to memory of 3044 2868 net.exe 75 PID 2868 wrote to memory of 3044 2868 net.exe 75 PID 3904 wrote to memory of 3664 3904 msiexec.exe 76 PID 3904 wrote to memory of 3664 3904 msiexec.exe 76 PID 3904 wrote to memory of 3664 3904 msiexec.exe 76 PID 3664 wrote to memory of 3668 3664 cmd.exe 78 PID 3664 wrote to memory of 3668 3664 cmd.exe 78 PID 3664 wrote to memory of 3668 3664 cmd.exe 78 PID 3904 wrote to memory of 3920 3904 msiexec.exe 79 PID 3904 wrote to memory of 3920 3904 msiexec.exe 79 PID 3904 wrote to memory of 3920 3904 msiexec.exe 79 PID 3920 wrote to memory of 3352 3920 cmd.exe 81 PID 3920 wrote to memory of 3352 3920 cmd.exe 81 PID 3920 wrote to memory of 3352 3920 cmd.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:392
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\net.exenet config workstation5⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:3044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:3668
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:3352
-
-
-
-