Analysis

  • max time kernel
    132s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    02-10-2020 07:25

General

  • Target

    PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe

  • Size

    854KB

  • MD5

    ee25cc3a8bfe7ca957ceabba93532f98

  • SHA1

    58d4cda42858beae2cabc81b3431662a1706c169

  • SHA256

    e9faa7dce8d4693ebef2e9f47d3af496323b887e7733e38eca4e40a937cd1dfe

  • SHA512

    6f6663c56c7c0867da762d82015cb20757669edc980ed3d302de1df43ae61e4baa11329b3ab0ea065add9d4a4f43d1a1020720269a3b09df76f2cf62cdde058b

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe
    "C:\Users\Admin\AppData\Local\Temp\PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo tfJK
      2⤵
        PID:1832
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < VWjxBKXxtoNK.com
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1808
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 vAyrJy.woJRtj
            4⤵
            • Runs ping.exe
            PID:1580
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode hbMSEvVVhDZPqqUGJul.com g
            4⤵
              PID:1428
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.com
              lsass.com g
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1360
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.com g
                5⤵
                • Executes dropped EXE
                • Drops startup file
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:756
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\attrib.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\attrib.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  • Views/modifies file attributes
                  PID:268
                  • C:\Windows\SysWOW64\REG.exe
                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v cred /t REG_SZ /d "rundll32 C:\Users\Admin\AppData\Local\Temp\cred.dll, Main"
                    7⤵
                    • Adds Run key to start application
                    PID:736
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cred.dll, Main
                    7⤵
                    • Blacklisted process makes network request
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:916
                  • C:\Windows\SysWOW64\REG.exe
                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v scr /t REG_SZ /d "rundll32 C:\Users\Admin\AppData\Local\Temp\scr.dll, Main"
                    7⤵
                    • Adds Run key to start application
                    PID:1564
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe C:\Users\Admin\AppData\Local\Temp\scr.dll, Main
                    7⤵
                    • Blacklisted process makes network request
                    • Loads dropped DLL
                    PID:1464
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 30
              4⤵
              • Runs ping.exe
              PID:1100

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/268-19-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/268-22-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/540-23-0x000007FEF6F00000-0x000007FEF717A000-memory.dmp

        Filesize

        2.5MB