Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-11-2020 16:05
Static task
static1
Behavioral task
behavioral1
Sample
931fdd551975cf30ae02f85a90c5ee22.exe
Resource
win7v20201028
General
-
Target
931fdd551975cf30ae02f85a90c5ee22.exe
-
Size
215KB
-
MD5
931fdd551975cf30ae02f85a90c5ee22
-
SHA1
d0330b0199af3e6c06534fee5cbf9d5e88966bc1
-
SHA256
28af95bea8456409bdb09856b0f46304eff9801c3c841b1362ca7a794d7628a5
-
SHA512
68b29d615d97e0be26d799390ba526b5959a805006f1294238073b980266e73b86b5f9a90948bd5170023b80b5d0141baa4784eb1a71b2036a7e36fdf8b71f32
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
bdalGDAA.exebdalGDAA.exebdalGDAA.exebdalGDAA.exepid process 1580 bdalGDAA.exe 620 bdalGDAA.exe 1968 bdalGDAA.exe 1584 bdalGDAA.exe -
Loads dropped DLL 2 IoCs
Processes:
931fdd551975cf30ae02f85a90c5ee22.exepid process 1632 931fdd551975cf30ae02f85a90c5ee22.exe 1632 931fdd551975cf30ae02f85a90c5ee22.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
931fdd551975cf30ae02f85a90c5ee22.execmd.exetaskeng.exedescription pid process target process PID 1632 wrote to memory of 1580 1632 931fdd551975cf30ae02f85a90c5ee22.exe bdalGDAA.exe PID 1632 wrote to memory of 1580 1632 931fdd551975cf30ae02f85a90c5ee22.exe bdalGDAA.exe PID 1632 wrote to memory of 1580 1632 931fdd551975cf30ae02f85a90c5ee22.exe bdalGDAA.exe PID 1632 wrote to memory of 1580 1632 931fdd551975cf30ae02f85a90c5ee22.exe bdalGDAA.exe PID 1632 wrote to memory of 1740 1632 931fdd551975cf30ae02f85a90c5ee22.exe cmd.exe PID 1632 wrote to memory of 1740 1632 931fdd551975cf30ae02f85a90c5ee22.exe cmd.exe PID 1632 wrote to memory of 1740 1632 931fdd551975cf30ae02f85a90c5ee22.exe cmd.exe PID 1632 wrote to memory of 1740 1632 931fdd551975cf30ae02f85a90c5ee22.exe cmd.exe PID 1740 wrote to memory of 1208 1740 cmd.exe schtasks.exe PID 1740 wrote to memory of 1208 1740 cmd.exe schtasks.exe PID 1740 wrote to memory of 1208 1740 cmd.exe schtasks.exe PID 1740 wrote to memory of 1208 1740 cmd.exe schtasks.exe PID 548 wrote to memory of 620 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 620 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 620 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 620 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1968 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1968 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1968 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1968 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1584 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1584 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1584 548 taskeng.exe bdalGDAA.exe PID 548 wrote to memory of 1584 548 taskeng.exe bdalGDAA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\931fdd551975cf30ae02f85a90c5ee22.exe"C:\Users\Admin\AppData\Local\Temp\931fdd551975cf30ae02f85a90c5ee22.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\bdalGDAA.exe"C:\Users\Admin\AppData\Local\Temp\bdalGDAA.exe"2⤵
- Executes dropped EXE
PID:1580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /F /sc minute /mo 1 /tn "\WindowsAppPool\AppPool" /tr "C:\Users\Admin\AppData\Local\Temp\bdalGDAA.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /F /sc minute /mo 1 /tn "\WindowsAppPool\AppPool" /tr "C:\Users\Admin\AppData\Local\Temp\bdalGDAA.exe"3⤵
- Creates scheduled task(s)
PID:1208
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {00727168-A724-4494-888A-669FA25954FC} S-1-5-21-293278959-2699126792-324916226-1000:TUICJFPF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\bdalGDAA.exeC:\Users\Admin\AppData\Local\Temp\bdalGDAA.exe2⤵
- Executes dropped EXE
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\bdalGDAA.exeC:\Users\Admin\AppData\Local\Temp\bdalGDAA.exe2⤵
- Executes dropped EXE
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\bdalGDAA.exeC:\Users\Admin\AppData\Local\Temp\bdalGDAA.exe2⤵
- Executes dropped EXE
PID:1584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8b377bd11678351f77f18969a195dab4
SHA195f04cb44182840f36002e91aabfd25ffa03b45f
SHA25659b2349a342acd43b45f8627da9efde914a6ace21ac9c711cb2e62eda115154f
SHA51247a66ca9821a9ac6d893be3c6dbcda370ee7931873d0f50edc7b41f75037f9cf4db3e0158ffb127a97349d378da0bcce4cb5f0b02254d940c75d2b9b93feac83
-
MD5
8b377bd11678351f77f18969a195dab4
SHA195f04cb44182840f36002e91aabfd25ffa03b45f
SHA25659b2349a342acd43b45f8627da9efde914a6ace21ac9c711cb2e62eda115154f
SHA51247a66ca9821a9ac6d893be3c6dbcda370ee7931873d0f50edc7b41f75037f9cf4db3e0158ffb127a97349d378da0bcce4cb5f0b02254d940c75d2b9b93feac83
-
MD5
8b377bd11678351f77f18969a195dab4
SHA195f04cb44182840f36002e91aabfd25ffa03b45f
SHA25659b2349a342acd43b45f8627da9efde914a6ace21ac9c711cb2e62eda115154f
SHA51247a66ca9821a9ac6d893be3c6dbcda370ee7931873d0f50edc7b41f75037f9cf4db3e0158ffb127a97349d378da0bcce4cb5f0b02254d940c75d2b9b93feac83
-
MD5
8b377bd11678351f77f18969a195dab4
SHA195f04cb44182840f36002e91aabfd25ffa03b45f
SHA25659b2349a342acd43b45f8627da9efde914a6ace21ac9c711cb2e62eda115154f
SHA51247a66ca9821a9ac6d893be3c6dbcda370ee7931873d0f50edc7b41f75037f9cf4db3e0158ffb127a97349d378da0bcce4cb5f0b02254d940c75d2b9b93feac83
-
MD5
8b377bd11678351f77f18969a195dab4
SHA195f04cb44182840f36002e91aabfd25ffa03b45f
SHA25659b2349a342acd43b45f8627da9efde914a6ace21ac9c711cb2e62eda115154f
SHA51247a66ca9821a9ac6d893be3c6dbcda370ee7931873d0f50edc7b41f75037f9cf4db3e0158ffb127a97349d378da0bcce4cb5f0b02254d940c75d2b9b93feac83
-
MD5
8b377bd11678351f77f18969a195dab4
SHA195f04cb44182840f36002e91aabfd25ffa03b45f
SHA25659b2349a342acd43b45f8627da9efde914a6ace21ac9c711cb2e62eda115154f
SHA51247a66ca9821a9ac6d893be3c6dbcda370ee7931873d0f50edc7b41f75037f9cf4db3e0158ffb127a97349d378da0bcce4cb5f0b02254d940c75d2b9b93feac83
-
MD5
8b377bd11678351f77f18969a195dab4
SHA195f04cb44182840f36002e91aabfd25ffa03b45f
SHA25659b2349a342acd43b45f8627da9efde914a6ace21ac9c711cb2e62eda115154f
SHA51247a66ca9821a9ac6d893be3c6dbcda370ee7931873d0f50edc7b41f75037f9cf4db3e0158ffb127a97349d378da0bcce4cb5f0b02254d940c75d2b9b93feac83