Analysis
-
max time kernel
25s -
max time network
109s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:37
Static task
static1
Behavioral task
behavioral1
Sample
good5.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
good5.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
good5.exe
-
Size
134KB
-
MD5
5f3450647a951c4c8a262f603ca8aabf
-
SHA1
0dc1e18dc14a9e6d5dedf644b4d690075e77bbff
-
SHA256
ea05817e0614fd085e2775d01e7197e93bde58cf57789aeb49ed39f6c295973c
-
SHA512
8f2eff9a18b27b3bce75f9b7c0c0b3d947344c7acd71e54ee398ca15b089f1000dbb1643ad2c8d0d21dccf5dc54fd4af7c15e3a4cafa150dd8e13bcb5a8e04e0
Score
10/10
Malware Config
Signatures
-
Ostap JavaScript Downloader 1 IoCs
Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot
resource yara_rule behavioral2/files/0x000300000001ab8f-2.dat family_ostap -
ostap
Ostap is a JS downloader, used to deliver other families.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" good5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce good5.exe -
JavaScript code in executable 1 IoCs
resource yara_rule behavioral2/files/0x000300000001ab8f-2.dat js -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 412 wrote to memory of 3212 412 good5.exe 75 PID 412 wrote to memory of 3212 412 good5.exe 75 PID 412 wrote to memory of 3212 412 good5.exe 75 PID 3212 wrote to memory of 3016 3212 cmd.exe 80 PID 3212 wrote to memory of 3016 3212 cmd.exe 80 PID 3212 wrote to memory of 3016 3212 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\good5.exe"C:\Users\Admin\AppData\Local\Temp\good5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\cmd.execmd /c type xi.bmp & magnium.jse & set2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\magnium.jse"3⤵PID:3016
-
-