Analysis
-
max time kernel
132s -
max time network
138s -
platform
windows7_x64 -
resource
win7 -
submitted
02-10-2020 07:25
Static task
static1
Behavioral task
behavioral1
Sample
PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe
Resource
win7
Behavioral task
behavioral2
Sample
PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe
Resource
win10v200722
General
-
Target
PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe
-
Size
854KB
-
MD5
ee25cc3a8bfe7ca957ceabba93532f98
-
SHA1
58d4cda42858beae2cabc81b3431662a1706c169
-
SHA256
e9faa7dce8d4693ebef2e9f47d3af496323b887e7733e38eca4e40a937cd1dfe
-
SHA512
6f6663c56c7c0867da762d82015cb20757669edc980ed3d302de1df43ae61e4baa11329b3ab0ea065add9d4a4f43d1a1020720269a3b09df76f2cf62cdde058b
Malware Config
Signatures
-
Blacklisted process makes network request 2 IoCs
flow pid Process 9 916 rundll32.exe 11 1464 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 1360 lsass.com 756 lsass.com 268 attrib.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.url lsass.com -
Loads dropped DLL 11 IoCs
pid Process 1592 cmd.exe 1360 lsass.com 756 lsass.com 916 rundll32.exe 916 rundll32.exe 916 rundll32.exe 916 rundll32.exe 1464 rundll32.exe 1464 rundll32.exe 1464 rundll32.exe 1464 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\cred = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\cred.dll, Main" REG.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\scr = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\scr.dll, Main" REG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 756 set thread context of 268 756 lsass.com 38 -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1580 PING.EXE 1100 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 916 rundll32.exe 916 rundll32.exe 916 rundll32.exe 916 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 756 lsass.com -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1832 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 28 PID 1768 wrote to memory of 1832 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 28 PID 1768 wrote to memory of 1832 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 28 PID 1768 wrote to memory of 1832 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 28 PID 1768 wrote to memory of 1808 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 30 PID 1768 wrote to memory of 1808 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 30 PID 1768 wrote to memory of 1808 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 30 PID 1768 wrote to memory of 1808 1768 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 30 PID 1808 wrote to memory of 1592 1808 cmd.exe 32 PID 1808 wrote to memory of 1592 1808 cmd.exe 32 PID 1808 wrote to memory of 1592 1808 cmd.exe 32 PID 1808 wrote to memory of 1592 1808 cmd.exe 32 PID 1592 wrote to memory of 1580 1592 cmd.exe 33 PID 1592 wrote to memory of 1580 1592 cmd.exe 33 PID 1592 wrote to memory of 1580 1592 cmd.exe 33 PID 1592 wrote to memory of 1580 1592 cmd.exe 33 PID 1592 wrote to memory of 1428 1592 cmd.exe 34 PID 1592 wrote to memory of 1428 1592 cmd.exe 34 PID 1592 wrote to memory of 1428 1592 cmd.exe 34 PID 1592 wrote to memory of 1428 1592 cmd.exe 34 PID 1592 wrote to memory of 1360 1592 cmd.exe 35 PID 1592 wrote to memory of 1360 1592 cmd.exe 35 PID 1592 wrote to memory of 1360 1592 cmd.exe 35 PID 1592 wrote to memory of 1360 1592 cmd.exe 35 PID 1592 wrote to memory of 1100 1592 cmd.exe 36 PID 1592 wrote to memory of 1100 1592 cmd.exe 36 PID 1592 wrote to memory of 1100 1592 cmd.exe 36 PID 1592 wrote to memory of 1100 1592 cmd.exe 36 PID 1360 wrote to memory of 756 1360 lsass.com 37 PID 1360 wrote to memory of 756 1360 lsass.com 37 PID 1360 wrote to memory of 756 1360 lsass.com 37 PID 1360 wrote to memory of 756 1360 lsass.com 37 PID 756 wrote to memory of 268 756 lsass.com 38 PID 756 wrote to memory of 268 756 lsass.com 38 PID 756 wrote to memory of 268 756 lsass.com 38 PID 756 wrote to memory of 268 756 lsass.com 38 PID 756 wrote to memory of 268 756 lsass.com 38 PID 268 wrote to memory of 736 268 attrib.exe 41 PID 268 wrote to memory of 736 268 attrib.exe 41 PID 268 wrote to memory of 736 268 attrib.exe 41 PID 268 wrote to memory of 736 268 attrib.exe 41 PID 268 wrote to memory of 916 268 attrib.exe 42 PID 268 wrote to memory of 916 268 attrib.exe 42 PID 268 wrote to memory of 916 268 attrib.exe 42 PID 268 wrote to memory of 916 268 attrib.exe 42 PID 268 wrote to memory of 916 268 attrib.exe 42 PID 268 wrote to memory of 916 268 attrib.exe 42 PID 268 wrote to memory of 916 268 attrib.exe 42 PID 268 wrote to memory of 1564 268 attrib.exe 44 PID 268 wrote to memory of 1564 268 attrib.exe 44 PID 268 wrote to memory of 1564 268 attrib.exe 44 PID 268 wrote to memory of 1564 268 attrib.exe 44 PID 268 wrote to memory of 1464 268 attrib.exe 45 PID 268 wrote to memory of 1464 268 attrib.exe 45 PID 268 wrote to memory of 1464 268 attrib.exe 45 PID 268 wrote to memory of 1464 268 attrib.exe 45 PID 268 wrote to memory of 1464 268 attrib.exe 45 PID 268 wrote to memory of 1464 268 attrib.exe 45 PID 268 wrote to memory of 1464 268 attrib.exe 45 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 268 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe"C:\Users\Admin\AppData\Local\Temp\PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo tfJK2⤵PID:1832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < VWjxBKXxtoNK.com2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\PING.EXEping -n 1 vAyrJy.woJRtj4⤵
- Runs ping.exe
PID:1580
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode hbMSEvVVhDZPqqUGJul.com g4⤵PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.comlsass.com g4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.com g5⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\attrib.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\attrib.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:268 -
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v cred /t REG_SZ /d "rundll32 C:\Users\Admin\AppData\Local\Temp\cred.dll, Main"7⤵
- Adds Run key to start application
PID:736
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cred.dll, Main7⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v scr /t REG_SZ /d "rundll32 C:\Users\Admin\AppData\Local\Temp\scr.dll, Main"7⤵
- Adds Run key to start application
PID:1564
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\scr.dll, Main7⤵
- Blacklisted process makes network request
- Loads dropped DLL
PID:1464
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:1100
-
-
-