Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-11-2020 17:40

General

  • Target

    1bf6e25f5655dd96b13058e02e864b038a96cb2ddfb805c551b3df33c5782dae.exe

  • Size

    392KB

  • MD5

    57593773a392df0619b0052695fb5e6f

  • SHA1

    376dc24d2cadd9f7c2ba6e639d929c4133a19a78

  • SHA256

    1bf6e25f5655dd96b13058e02e864b038a96cb2ddfb805c551b3df33c5782dae

  • SHA512

    3e9207e778ce2d7ec6e09cab6c6f399cf6d4b5a2fed1c853cbc2755e7b33bbef611bad60befba409f775b6d6ca86be6b9dee0d7d6627a6057da023f1f773a199

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bf6e25f5655dd96b13058e02e864b038a96cb2ddfb805c551b3df33c5782dae.exe
    "C:\Users\Admin\AppData\Local\Temp\1bf6e25f5655dd96b13058e02e864b038a96cb2ddfb805c551b3df33c5782dae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Local\Temp\1bf6e25f5655dd96b13058e02e864b038a96cb2ddfb805c551b3df33c5782dae.exe
      "C:\Users\Admin\AppData\Local\Temp\1bf6e25f5655dd96b13058e02e864b038a96cb2ddfb805c551b3df33c5782dae.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Users\Admin\AppData\Local\Temp\325.exe
          "C:\Users\Admin\AppData\Local\Temp\325.exe"
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1432
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2292
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:3624
              • C:\Windows\system32\netsh.exe
                netsh wlan show profile
                6⤵
                  PID:1300
                • C:\Windows\system32\findstr.exe
                  findstr All
                  6⤵
                    PID:2328
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1228
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    6⤵
                      PID:2716
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show networks mode=bssid
                      6⤵
                        PID:3488
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp2D2E.tmp.bat
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1004
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        6⤵
                          PID:3028
                        • C:\Windows\system32\taskkill.exe
                          TaskKill /F /IM 1432
                          6⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3488
                        • C:\Windows\system32\timeout.exe
                          Timeout /T 2 /Nobreak
                          6⤵
                          • Delays execution with timeout.exe
                          PID:3944
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1752

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1432-23-0x000000001CAE0000-0x000000001CAE1000-memory.dmp

                Filesize

                4KB

              • memory/1432-13-0x0000000001F50000-0x0000000001FC0000-memory.dmp

                Filesize

                448KB

              • memory/1432-14-0x0000000001E90000-0x0000000001E91000-memory.dmp

                Filesize

                4KB

              • memory/1432-25-0x0000000001EC0000-0x0000000001EC5000-memory.dmp

                Filesize

                20KB

              • memory/1432-22-0x000000001C9D0000-0x000000001C9D1000-memory.dmp

                Filesize

                4KB

              • memory/1432-11-0x0000000000D50000-0x0000000000D51000-memory.dmp

                Filesize

                4KB

              • memory/1432-10-0x00007FFB84A80000-0x00007FFB8546C000-memory.dmp

                Filesize

                9.9MB

              • memory/2580-0-0x0000000000400000-0x000000000040F000-memory.dmp

                Filesize

                60KB

              • memory/3048-5-0x00000000005B0000-0x00000000005B5000-memory.dmp

                Filesize

                20KB

              • memory/3212-2-0x0000000000820000-0x000000000082F000-memory.dmp

                Filesize

                60KB