Analysis
-
max time kernel
129s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10/11/2020, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe
-
Size
273KB
-
MD5
7f1d3c53b9ec4e4a0de133e294c59503
-
SHA1
0a5cf542342a579a2da13fe81f2a33e8beb2dd53
-
SHA256
02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74
-
SHA512
38693beb421aa4b18de14edc82a360e437e3269003ac94322f2cd34ce9a6c8cd4ee4d5d3fec785f36e752b7e6bd8f2a62a95988282240181d24f0f3341897486
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 856 ACCTlg32.exe -
resource yara_rule behavioral2/files/0x000200000001ab6e-4.dat upx behavioral2/files/0x000200000001ab6e-5.dat upx -
Deletes itself 1 IoCs
pid Process 856 ACCTlg32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\advadext = "C:\\Users\\Admin\\AppData\\Roaming\\capicatq\\ACCTlg32.exe" 02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 856 set thread context of 988 856 ACCTlg32.exe 80 PID 988 set thread context of 2868 988 svchost.exe 57 PID 2868 set thread context of 3480 2868 Explorer.EXE 60 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 856 ACCTlg32.exe 856 ACCTlg32.exe 2868 Explorer.EXE 2868 Explorer.EXE -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 856 ACCTlg32.exe 988 svchost.exe 2868 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 880 wrote to memory of 3228 880 02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe 76 PID 880 wrote to memory of 3228 880 02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe 76 PID 880 wrote to memory of 3228 880 02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe 76 PID 3228 wrote to memory of 64 3228 cmd.exe 78 PID 3228 wrote to memory of 64 3228 cmd.exe 78 PID 3228 wrote to memory of 64 3228 cmd.exe 78 PID 64 wrote to memory of 856 64 cmd.exe 79 PID 64 wrote to memory of 856 64 cmd.exe 79 PID 64 wrote to memory of 856 64 cmd.exe 79 PID 856 wrote to memory of 988 856 ACCTlg32.exe 80 PID 856 wrote to memory of 988 856 ACCTlg32.exe 80 PID 856 wrote to memory of 988 856 ACCTlg32.exe 80 PID 856 wrote to memory of 988 856 ACCTlg32.exe 80 PID 856 wrote to memory of 988 856 ACCTlg32.exe 80 PID 988 wrote to memory of 2868 988 svchost.exe 57 PID 988 wrote to memory of 2868 988 svchost.exe 57 PID 988 wrote to memory of 2868 988 svchost.exe 57 PID 2868 wrote to memory of 3480 2868 Explorer.EXE 60 PID 2868 wrote to memory of 3480 2868 Explorer.EXE 60 PID 2868 wrote to memory of 3480 2868 Explorer.EXE 60
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe"C:\Users\Admin\AppData\Local\Temp\02d165251fbb673606e8c48754a9d5e4682317b5a277e71ad541d252e107aa74.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2D9E\10.bat" "C:\Users\Admin\AppData\Roaming\capicatq\ACCTlg32.exe" "C:\Users\Admin\AppData\Local\Temp\02D165~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\capicatq\ACCTlg32.exe" "C:\Users\Admin\AppData\Local\Temp\02D165~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Roaming\capicatq\ACCTlg32.exe"C:\Users\Admin\AppData\Roaming\capicatq\ACCTlg32.exe" "C:\Users\Admin\AppData\Local\Temp\02D165~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:988
-
-
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3480