Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
02-10-2020 07:25
Static task
static1
Behavioral task
behavioral1
Sample
PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe
Resource
win7
Behavioral task
behavioral2
Sample
PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe
Resource
win10v200722
General
-
Target
PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe
-
Size
854KB
-
MD5
ee25cc3a8bfe7ca957ceabba93532f98
-
SHA1
58d4cda42858beae2cabc81b3431662a1706c169
-
SHA256
e9faa7dce8d4693ebef2e9f47d3af496323b887e7733e38eca4e40a937cd1dfe
-
SHA512
6f6663c56c7c0867da762d82015cb20757669edc980ed3d302de1df43ae61e4baa11329b3ab0ea065add9d4a4f43d1a1020720269a3b09df76f2cf62cdde058b
Malware Config
Signatures
-
Blacklisted process makes network request 2 IoCs
flow pid Process 16 4016 rundll32.exe 18 4036 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 3748 lsass.com 3988 lsass.com 2488 attrib.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.url lsass.com -
Loads dropped DLL 3 IoCs
pid Process 4016 rundll32.exe 4036 rundll32.exe 4036 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run\cred = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\cred.dll, Main" REG.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run\scr = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\scr.dll, Main" REG.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3988 set thread context of 2488 3988 lsass.com 87 -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 576 PING.EXE 3124 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4016 rundll32.exe 4016 rundll32.exe 4016 rundll32.exe 4016 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3988 lsass.com -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3876 wrote to memory of 2080 3876 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 72 PID 3876 wrote to memory of 2080 3876 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 72 PID 3876 wrote to memory of 2080 3876 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 72 PID 3876 wrote to memory of 3980 3876 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 74 PID 3876 wrote to memory of 3980 3876 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 74 PID 3876 wrote to memory of 3980 3876 PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe 74 PID 3980 wrote to memory of 3948 3980 cmd.exe 76 PID 3980 wrote to memory of 3948 3980 cmd.exe 76 PID 3980 wrote to memory of 3948 3980 cmd.exe 76 PID 3948 wrote to memory of 576 3948 cmd.exe 77 PID 3948 wrote to memory of 576 3948 cmd.exe 77 PID 3948 wrote to memory of 576 3948 cmd.exe 77 PID 3948 wrote to memory of 2220 3948 cmd.exe 78 PID 3948 wrote to memory of 2220 3948 cmd.exe 78 PID 3948 wrote to memory of 2220 3948 cmd.exe 78 PID 3948 wrote to memory of 3748 3948 cmd.exe 79 PID 3948 wrote to memory of 3748 3948 cmd.exe 79 PID 3948 wrote to memory of 3748 3948 cmd.exe 79 PID 3948 wrote to memory of 3124 3948 cmd.exe 80 PID 3948 wrote to memory of 3124 3948 cmd.exe 80 PID 3948 wrote to memory of 3124 3948 cmd.exe 80 PID 3748 wrote to memory of 3988 3748 lsass.com 81 PID 3748 wrote to memory of 3988 3748 lsass.com 81 PID 3748 wrote to memory of 3988 3748 lsass.com 81 PID 3988 wrote to memory of 2488 3988 lsass.com 87 PID 3988 wrote to memory of 2488 3988 lsass.com 87 PID 3988 wrote to memory of 2488 3988 lsass.com 87 PID 3988 wrote to memory of 2488 3988 lsass.com 87 PID 2488 wrote to memory of 2268 2488 attrib.exe 88 PID 2488 wrote to memory of 2268 2488 attrib.exe 88 PID 2488 wrote to memory of 2268 2488 attrib.exe 88 PID 2488 wrote to memory of 4016 2488 attrib.exe 90 PID 2488 wrote to memory of 4016 2488 attrib.exe 90 PID 2488 wrote to memory of 4016 2488 attrib.exe 90 PID 2488 wrote to memory of 744 2488 attrib.exe 91 PID 2488 wrote to memory of 744 2488 attrib.exe 91 PID 2488 wrote to memory of 744 2488 attrib.exe 91 PID 2488 wrote to memory of 4036 2488 attrib.exe 92 PID 2488 wrote to memory of 4036 2488 attrib.exe 92 PID 2488 wrote to memory of 4036 2488 attrib.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2488 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe"C:\Users\Admin\AppData\Local\Temp\PAGO_EN_TOTALIDAD_300920209857512014789653202356985868320175948756230159865230214758968574210236582141.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo tfJK2⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < VWjxBKXxtoNK.com2⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\PING.EXEping -n 1 vAyrJy.woJRtj4⤵
- Runs ping.exe
PID:576
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode hbMSEvVVhDZPqqUGJul.com g4⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.comlsass.com g4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsass.com g5⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\attrib.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\attrib.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:2488 -
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v cred /t REG_SZ /d "rundll32 C:\Users\Admin\AppData\Local\Temp\cred.dll, Main"7⤵
- Adds Run key to start application
PID:2268
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cred.dll, Main7⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v scr /t REG_SZ /d "rundll32 C:\Users\Admin\AppData\Local\Temp\scr.dll, Main"7⤵
- Adds Run key to start application
PID:744
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\scr.dll, Main7⤵
- Blacklisted process makes network request
- Loads dropped DLL
PID:4036
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:3124
-
-
-