Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 15:39
Static task
static1
Behavioral task
behavioral1
Sample
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe
-
Size
327KB
-
MD5
2e2ed2b2bc917a92eb0d9bdb466da3b9
-
SHA1
f361d57f199c8a75c8e92b5ff0385e978cda0e53
-
SHA256
d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702
-
SHA512
7011c2fea9a87c19b86ce4fff579a7e73796ea9fc4474880ef0f84801f86a37b385b54cb271dc486f38ff3fd6f1727d0ac640e7155f1fa297b80e61e360fa844
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 492 Callmuid.exe -
Deletes itself 1 IoCs
pid Process 492 Callmuid.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\acmiager = "C:\\Users\\Admin\\AppData\\Roaming\\Certmcat\\Callmuid.exe" d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 492 set thread context of 3652 492 Callmuid.exe 82 PID 3652 set thread context of 3044 3652 svchost.exe 57 PID 3044 set thread context of 3592 3044 Explorer.EXE 60 PID 3044 set thread context of 3096 3044 Explorer.EXE 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 492 Callmuid.exe 492 Callmuid.exe 3044 Explorer.EXE 3044 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 492 Callmuid.exe 3652 svchost.exe 3044 Explorer.EXE 3044 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3044 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1140 wrote to memory of 996 1140 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe 76 PID 1140 wrote to memory of 996 1140 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe 76 PID 1140 wrote to memory of 996 1140 d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe 76 PID 996 wrote to memory of 208 996 cmd.exe 78 PID 996 wrote to memory of 208 996 cmd.exe 78 PID 996 wrote to memory of 208 996 cmd.exe 78 PID 208 wrote to memory of 492 208 cmd.exe 79 PID 208 wrote to memory of 492 208 cmd.exe 79 PID 208 wrote to memory of 492 208 cmd.exe 79 PID 492 wrote to memory of 3652 492 Callmuid.exe 82 PID 492 wrote to memory of 3652 492 Callmuid.exe 82 PID 492 wrote to memory of 3652 492 Callmuid.exe 82 PID 492 wrote to memory of 3652 492 Callmuid.exe 82 PID 492 wrote to memory of 3652 492 Callmuid.exe 82 PID 3652 wrote to memory of 3044 3652 svchost.exe 57 PID 3652 wrote to memory of 3044 3652 svchost.exe 57 PID 3652 wrote to memory of 3044 3652 svchost.exe 57 PID 3044 wrote to memory of 3592 3044 Explorer.EXE 60 PID 3044 wrote to memory of 3592 3044 Explorer.EXE 60 PID 3044 wrote to memory of 3592 3044 Explorer.EXE 60 PID 3044 wrote to memory of 3772 3044 Explorer.EXE 84 PID 3044 wrote to memory of 3772 3044 Explorer.EXE 84 PID 3772 wrote to memory of 2096 3772 cmd.exe 86 PID 3772 wrote to memory of 2096 3772 cmd.exe 86 PID 3044 wrote to memory of 2444 3044 Explorer.EXE 87 PID 3044 wrote to memory of 2444 3044 Explorer.EXE 87 PID 3044 wrote to memory of 3096 3044 Explorer.EXE 89 PID 3044 wrote to memory of 3096 3044 Explorer.EXE 89 PID 3044 wrote to memory of 3096 3044 Explorer.EXE 89 PID 3044 wrote to memory of 3096 3044 Explorer.EXE 89 PID 3044 wrote to memory of 3096 3044 Explorer.EXE 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"C:\Users\Admin\AppData\Local\Temp\d0c6a4b3d920ff9efb4150c7b59de59497baf32f6c92ffd570a5406633665702.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\97A8\37.bat" "C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe"C:\Users\Admin\AppData\Roaming\Certmcat\Callmuid.exe" "C:\Users\Admin\AppData\Local\Temp\D0C6A4~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3652
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\EE3A.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2096
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EE3A.bi1"2⤵PID:2444
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:3096
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3592