Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 15:39
Static task
static1
Behavioral task
behavioral1
Sample
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
Resource
win7v20201028
General
-
Target
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
-
Size
327KB
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
-
SHA1
f361d57f199c8a75c8e92b5ff0385e978cda0e53
-
SHA256
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
-
SHA512
7011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844
Malware Config
Extracted
ursnif
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Callmuid.exepid process 492 Callmuid.exe -
Deletes itself 1 IoCs
Processes:
Callmuid.exepid process 492 Callmuid.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\acmiager = "C:\\Users\\Admin\\AppData\\Roaming\\Certmcat\\Callmuid.exe" d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Callmuid.exesvchost.exeExplorer.EXEdescription pid process target process PID 492 set thread context of 3652 492 Callmuid.exe svchost.exe PID 3652 set thread context of 3044 3652 svchost.exe Explorer.EXE PID 3044 set thread context of 3592 3044 Explorer.EXE RuntimeBroker.exe PID 3044 set thread context of 3096 3044 Explorer.EXE WinMail.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Callmuid.exeExplorer.EXEpid process 492 Callmuid.exe 492 Callmuid.exe 3044 Explorer.EXE 3044 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
Callmuid.exesvchost.exeExplorer.EXEpid process 492 Callmuid.exe 3652 svchost.exe 3044 Explorer.EXE 3044 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3044 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.execmd.execmd.exeCallmuid.exesvchost.exeExplorer.EXEcmd.exedescription pid process target process PID 1140 wrote to memory of 996 1140 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe cmd.exe PID 1140 wrote to memory of 996 1140 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe cmd.exe PID 1140 wrote to memory of 996 1140 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe cmd.exe PID 996 wrote to memory of 208 996 cmd.exe cmd.exe PID 996 wrote to memory of 208 996 cmd.exe cmd.exe PID 996 wrote to memory of 208 996 cmd.exe cmd.exe PID 208 wrote to memory of 492 208 cmd.exe Callmuid.exe PID 208 wrote to memory of 492 208 cmd.exe Callmuid.exe PID 208 wrote to memory of 492 208 cmd.exe Callmuid.exe PID 492 wrote to memory of 3652 492 Callmuid.exe svchost.exe PID 492 wrote to memory of 3652 492 Callmuid.exe svchost.exe PID 492 wrote to memory of 3652 492 Callmuid.exe svchost.exe PID 492 wrote to memory of 3652 492 Callmuid.exe svchost.exe PID 492 wrote to memory of 3652 492 Callmuid.exe svchost.exe PID 3652 wrote to memory of 3044 3652 svchost.exe Explorer.EXE PID 3652 wrote to memory of 3044 3652 svchost.exe Explorer.EXE PID 3652 wrote to memory of 3044 3652 svchost.exe Explorer.EXE PID 3044 wrote to memory of 3592 3044 Explorer.EXE RuntimeBroker.exe PID 3044 wrote to memory of 3592 3044 Explorer.EXE RuntimeBroker.exe PID 3044 wrote to memory of 3592 3044 Explorer.EXE RuntimeBroker.exe PID 3044 wrote to memory of 3772 3044 Explorer.EXE cmd.exe PID 3044 wrote to memory of 3772 3044 Explorer.EXE cmd.exe PID 3772 wrote to memory of 2096 3772 cmd.exe nslookup.exe PID 3772 wrote to memory of 2096 3772 cmd.exe nslookup.exe PID 3044 wrote to memory of 2444 3044 Explorer.EXE cmd.exe PID 3044 wrote to memory of 2444 3044 Explorer.EXE cmd.exe PID 3044 wrote to memory of 3096 3044 Explorer.EXE WinMail.exe PID 3044 wrote to memory of 3096 3044 Explorer.EXE WinMail.exe PID 3044 wrote to memory of 3096 3044 Explorer.EXE WinMail.exe PID 3044 wrote to memory of 3096 3044 Explorer.EXE WinMail.exe PID 3044 wrote to memory of 3096 3044 Explorer.EXE WinMail.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\97A8\37.bat" "C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe"C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3652
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\EE3A.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2096
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EE3A.bi1"2⤵PID:2444
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:3096
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c9453518c87e4c0f7fbb81b43d9a2e40
SHA1644e2f520293f3221a41e5dcf69be12db00405d9
SHA256ad9a2db1634d4ed5062b18ab65e9dd2d0ad1a9834a8844949088dd0606e28508
SHA512695c1cb16b45074625bb12fa4c1bd13b07d49634e863a845c8ecfbb340a3060a6e70a7bbb088270f5a7426f1d848c5cf79227ec1268352af02f47fa13ad6c440
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
SHA1f361d57f199c8a75c8e92b5ff0385e978cda0e53
SHA256d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
SHA5127011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
SHA1f361d57f199c8a75c8e92b5ff0385e978cda0e53
SHA256d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
SHA5127011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844