Analysis
-
max time kernel
3s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 19:58
Static task
static1
Behavioral task
behavioral1
Sample
good.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
good.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
good.exe
-
Size
117KB
-
MD5
3656d2dfcd4f9ebf97e03fa2c9a05ade
-
SHA1
bd9ecbe901ff4366c789fa63eaffdda9d3f4e931
-
SHA256
b479533a51ba629bd5f20a7e9faa3bcccfddc72218b23dfd5a4ab15825204944
-
SHA512
2eb3f78eb1e6dd34563c78a5bd656813a4e80f49676a9fec5ab33290b9fa487d8817ff5cf8c3241031fadf0a010c8a0bf3c9afa5dda9e5c519838a3089350738
Score
10/10
Malware Config
Signatures
-
Ostap JavaScript Downloader 1 IoCs
Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot
resource yara_rule behavioral1/files/0x00050000000130d6-1.dat family_ostap -
ostap
Ostap is a JS downloader, used to deliver other families.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce good.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" good.exe -
JavaScript code in executable 1 IoCs
resource yara_rule behavioral1/files/0x00050000000130d6-1.dat js -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 476 wrote to memory of 1996 476 good.exe 26 PID 476 wrote to memory of 1996 476 good.exe 26 PID 476 wrote to memory of 1996 476 good.exe 26 PID 476 wrote to memory of 1996 476 good.exe 26 PID 476 wrote to memory of 1996 476 good.exe 26 PID 476 wrote to memory of 1996 476 good.exe 26 PID 476 wrote to memory of 1996 476 good.exe 26 PID 1996 wrote to memory of 1964 1996 cmd.exe 28 PID 1996 wrote to memory of 1964 1996 cmd.exe 28 PID 1996 wrote to memory of 1964 1996 cmd.exe 28 PID 1996 wrote to memory of 1964 1996 cmd.exe 28 PID 1996 wrote to memory of 1964 1996 cmd.exe 28 PID 1996 wrote to memory of 1964 1996 cmd.exe 28 PID 1996 wrote to memory of 1964 1996 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\good.exe"C:\Users\Admin\AppData\Local\Temp\good.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\cmd.execmd /c title ok && config.jse && type dr.txt && exit2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\config.jse"3⤵PID:1964
-
-