Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
09-08-2020 13:28
Static task
static1
Behavioral task
behavioral1
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win7v200722
Behavioral task
behavioral2
Sample
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
Resource
win10
General
-
Target
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll
-
Size
155KB
-
MD5
cd57e5511bb7c0390eb83b772c84de65
-
SHA1
5c6e3c717dfab4b0eb3ddfa6f3062355823f2088
-
SHA256
ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397
-
SHA512
036e4ded92ed1ee28ab79dfd19116c7b86fac5c3a9ca5cc7f92f4cbd5b4a4771a6dc01af93a5b65d53a0367dd684eb52bb81a51621baa56e84cbd4007406d362
Malware Config
Signatures
-
Blacklisted process makes network request 18 IoCs
Processes:
msiexec.exeflow pid process 14 3904 msiexec.exe 15 3904 msiexec.exe 16 3904 msiexec.exe 17 3904 msiexec.exe 18 3904 msiexec.exe 19 3904 msiexec.exe 20 3904 msiexec.exe 21 3904 msiexec.exe 22 3904 msiexec.exe 24 3904 msiexec.exe 25 3904 msiexec.exe 27 3904 msiexec.exe 28 3904 msiexec.exe 29 3904 msiexec.exe 31 3904 msiexec.exe 40 3904 msiexec.exe 41 3904 msiexec.exe 42 3904 msiexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yqpesue = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Tyumal\\anxa.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3880 set thread context of 3904 3880 rundll32.exe msiexec.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 392 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exepid process 3904 msiexec.exe 3904 msiexec.exe 3904 msiexec.exe 3904 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 3904 msiexec.exe Token: SeSecurityPrivilege 3904 msiexec.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
rundll32.exerundll32.exemsiexec.execmd.execmd.exenet.execmd.execmd.exedescription pid process target process PID 3832 wrote to memory of 3880 3832 rundll32.exe rundll32.exe PID 3832 wrote to memory of 3880 3832 rundll32.exe rundll32.exe PID 3832 wrote to memory of 3880 3832 rundll32.exe rundll32.exe PID 3880 wrote to memory of 3904 3880 rundll32.exe msiexec.exe PID 3880 wrote to memory of 3904 3880 rundll32.exe msiexec.exe PID 3880 wrote to memory of 3904 3880 rundll32.exe msiexec.exe PID 3880 wrote to memory of 3904 3880 rundll32.exe msiexec.exe PID 3880 wrote to memory of 3904 3880 rundll32.exe msiexec.exe PID 3904 wrote to memory of 4016 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 4016 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 4016 3904 msiexec.exe cmd.exe PID 4016 wrote to memory of 392 4016 cmd.exe ipconfig.exe PID 4016 wrote to memory of 392 4016 cmd.exe ipconfig.exe PID 4016 wrote to memory of 392 4016 cmd.exe ipconfig.exe PID 3904 wrote to memory of 732 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 732 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 732 3904 msiexec.exe cmd.exe PID 732 wrote to memory of 2868 732 cmd.exe net.exe PID 732 wrote to memory of 2868 732 cmd.exe net.exe PID 732 wrote to memory of 2868 732 cmd.exe net.exe PID 2868 wrote to memory of 3044 2868 net.exe net1.exe PID 2868 wrote to memory of 3044 2868 net.exe net1.exe PID 2868 wrote to memory of 3044 2868 net.exe net1.exe PID 3904 wrote to memory of 3664 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 3664 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 3664 3904 msiexec.exe cmd.exe PID 3664 wrote to memory of 3668 3664 cmd.exe net.exe PID 3664 wrote to memory of 3668 3664 cmd.exe net.exe PID 3664 wrote to memory of 3668 3664 cmd.exe net.exe PID 3904 wrote to memory of 3920 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 3920 3904 msiexec.exe cmd.exe PID 3904 wrote to memory of 3920 3904 msiexec.exe cmd.exe PID 3920 wrote to memory of 3352 3920 cmd.exe net.exe PID 3920 wrote to memory of 3352 3920 cmd.exe net.exe PID 3920 wrote to memory of 3352 3920 cmd.exe net.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce9d8545eb14f98f81526457b784ada2e37057dae2d74f625e47b4ed10549397.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:392
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\net.exenet config workstation5⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:3044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:3668
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:3352
-
-
-
-