Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    28-08-2020 12:55

General

  • Target

    frame.bin.exe

  • Size

    498KB

  • MD5

    2d411dc28a5faeb5893d7769b7c3b8a4

  • SHA1

    1db46d9a9e27146ca12dcc9caff51ede700cf026

  • SHA256

    b218fb4573b6c8fff51870de463a793238a4f317ce9abdcf8352954f92328eac

  • SHA512

    5aab004d78dc87528f8965426d446dde68f8c8ff4a34cfecf1b69ade65b625f15d34fccbf4629ff42e49410379bd447eaa4f2339f11483d950e174a7d5aa8804

Score
10/10

Malware Config

Signatures

  • ObliqueRAT

    Remote Access Trojan discovered in early 2020.

  • Executes dropped EXE 2 IoCs
  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\frame.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\frame.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Users\Public\Video\lphsi.exe
      "C:\Users\Public\Video\lphsi.exe"
      2⤵
      • Executes dropped EXE
      PID:2180
    • C:\Users\Public\Video\hrss.exe
      "C:\Users\Public\Video\hrss.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      PID:2384
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1780

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads