Analysis
-
max time kernel
11s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 19:58
Static task
static1
Behavioral task
behavioral1
Sample
good.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
good.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
good.exe
-
Size
117KB
-
MD5
3656d2dfcd4f9ebf97e03fa2c9a05ade
-
SHA1
bd9ecbe901ff4366c789fa63eaffdda9d3f4e931
-
SHA256
b479533a51ba629bd5f20a7e9faa3bcccfddc72218b23dfd5a4ab15825204944
-
SHA512
2eb3f78eb1e6dd34563c78a5bd656813a4e80f49676a9fec5ab33290b9fa487d8817ff5cf8c3241031fadf0a010c8a0bf3c9afa5dda9e5c519838a3089350738
Score
10/10
Malware Config
Signatures
-
Ostap JavaScript Downloader 1 IoCs
Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot
resource yara_rule behavioral2/files/0x000300000001ab5c-1.dat family_ostap -
ostap
Ostap is a JS downloader, used to deliver other families.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce good.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" good.exe -
JavaScript code in executable 1 IoCs
resource yara_rule behavioral2/files/0x000300000001ab5c-1.dat js -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3204 2604 good.exe 75 PID 2604 wrote to memory of 3204 2604 good.exe 75 PID 2604 wrote to memory of 3204 2604 good.exe 75 PID 3204 wrote to memory of 4056 3204 cmd.exe 77 PID 3204 wrote to memory of 4056 3204 cmd.exe 77 PID 3204 wrote to memory of 4056 3204 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\good.exe"C:\Users\Admin\AppData\Local\Temp\good.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c title ok && config.jse && type dr.txt && exit2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\config.jse"3⤵PID:4056
-
-