Analysis
-
max time kernel
45s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:44
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Agent.ESBE.13045.5868.dll
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.Trojan.Agent.ESBE.13045.5868.dll
-
Size
289KB
-
MD5
18ae7841b15c74b36792b37059aa9c4e
-
SHA1
dac0c76daa68c459a4e873b0a52a507a3134128a
-
SHA256
af5c8ec121ec569be6158eb7f9f1f47de4583ef840f7359faa6f5efef5f6d244
-
SHA512
cfda64ca015b7c78f8ef7898bfeeac6a38e6e5f983910cfd059394c164dc96a6faba532ea0ca86d1bcda1900bffa588653d2f8374c7b5693350e41c81c26c4a9
Malware Config
Signatures
-
Valak JavaScript Loader 2 IoCs
Processes:
resource yara_rule C:\Users\Public\CCGYPWTwr.iySAE valak C:\Users\Public\CCGYPWTwr.iySAE valak_js -
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule C:\Users\Public\CCGYPWTwr.iySAE js -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1020 wrote to memory of 1404 1020 rundll32.exe rundll32.exe PID 1020 wrote to memory of 1404 1020 rundll32.exe rundll32.exe PID 1020 wrote to memory of 1404 1020 rundll32.exe rundll32.exe PID 1404 wrote to memory of 188 1404 rundll32.exe wscript.exe PID 1404 wrote to memory of 188 1404 rundll32.exe wscript.exe PID 1404 wrote to memory of 188 1404 rundll32.exe wscript.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.ESBE.13045.5868.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.ESBE.13045.5868.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\wscript.exewscript.exe //E:jscript "C:\Users\Public\CCGYPWTwr.iySAE3⤵PID:188
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1308
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6df4cb0a89bdabcf858e7e407e3975f5
SHA1f41a9efe9f3cdce394893d90f564bb26e3cdd494
SHA256c65b67bfe6a5acf6ebfb7f327a6ce8f93bfe5ec579fe783f611a73ce031f7232
SHA512a49817c5b27a75263a57398a17f838e935660d554e6b36d8e11ec20817fd08b532851b527c7255d50556d85e1fa985ed0d766d7103f6178ab8ef8bab561b1a41