Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:37
Static task
static1
Behavioral task
behavioral1
Sample
good5.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
good5.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
good5.exe
-
Size
134KB
-
MD5
5f3450647a951c4c8a262f603ca8aabf
-
SHA1
0dc1e18dc14a9e6d5dedf644b4d690075e77bbff
-
SHA256
ea05817e0614fd085e2775d01e7197e93bde58cf57789aeb49ed39f6c295973c
-
SHA512
8f2eff9a18b27b3bce75f9b7c0c0b3d947344c7acd71e54ee398ca15b089f1000dbb1643ad2c8d0d21dccf5dc54fd4af7c15e3a4cafa150dd8e13bcb5a8e04e0
Score
10/10
Malware Config
Signatures
-
Ostap JavaScript Downloader 1 IoCs
Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot
resource yara_rule behavioral1/files/0x00050000000130e9-2.dat family_ostap -
ostap
Ostap is a JS downloader, used to deliver other families.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce good5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" good5.exe -
JavaScript code in executable 1 IoCs
resource yara_rule behavioral1/files/0x00050000000130e9-2.dat js -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1968 1056 good5.exe 26 PID 1056 wrote to memory of 1968 1056 good5.exe 26 PID 1056 wrote to memory of 1968 1056 good5.exe 26 PID 1056 wrote to memory of 1968 1056 good5.exe 26 PID 1056 wrote to memory of 1968 1056 good5.exe 26 PID 1056 wrote to memory of 1968 1056 good5.exe 26 PID 1056 wrote to memory of 1968 1056 good5.exe 26 PID 1968 wrote to memory of 1532 1968 cmd.exe 31 PID 1968 wrote to memory of 1532 1968 cmd.exe 31 PID 1968 wrote to memory of 1532 1968 cmd.exe 31 PID 1968 wrote to memory of 1532 1968 cmd.exe 31 PID 1968 wrote to memory of 1532 1968 cmd.exe 31 PID 1968 wrote to memory of 1532 1968 cmd.exe 31 PID 1968 wrote to memory of 1532 1968 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\good5.exe"C:\Users\Admin\AppData\Local\Temp\good5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c type xi.bmp & magnium.jse & set2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\magnium.jse"3⤵PID:1532
-
-