Analysis
-
max time kernel
129s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-11-2020 18:32
Static task
static1
Behavioral task
behavioral1
Sample
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
Resource
win7v20201028
General
-
Target
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
-
Size
365KB
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
-
SHA1
808955643df13e421c270e377c819cde4dd2c845
-
SHA256
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
-
SHA512
f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604
Malware Config
Extracted
ursnif
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
atltartv.exepid process 1456 atltartv.exe -
Deletes itself 1 IoCs
Processes:
atltartv.exepid process 1456 atltartv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\appmgSup = "C:\\Users\\Admin\\AppData\\Roaming\\amstcca\\atltartv.exe" 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
atltartv.exesvchost.exeExplorer.EXEdescription pid process target process PID 1456 set thread context of 4092 1456 atltartv.exe svchost.exe PID 4092 set thread context of 3040 4092 svchost.exe Explorer.EXE PID 3040 set thread context of 3500 3040 Explorer.EXE RuntimeBroker.exe PID 3040 set thread context of 2708 3040 Explorer.EXE WinMail.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
atltartv.exeExplorer.EXEpid process 1456 atltartv.exe 1456 atltartv.exe 3040 Explorer.EXE 3040 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
atltartv.exesvchost.exeExplorer.EXEpid process 1456 atltartv.exe 4092 svchost.exe 3040 Explorer.EXE 3040 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Explorer.EXEpid process 3040 Explorer.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Explorer.EXEpid process 3040 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3040 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.execmd.execmd.exeatltartv.exesvchost.exeExplorer.EXEcmd.exedescription pid process target process PID 1048 wrote to memory of 2932 1048 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe cmd.exe PID 1048 wrote to memory of 2932 1048 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe cmd.exe PID 1048 wrote to memory of 2932 1048 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe cmd.exe PID 2932 wrote to memory of 204 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 204 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 204 2932 cmd.exe cmd.exe PID 204 wrote to memory of 1456 204 cmd.exe atltartv.exe PID 204 wrote to memory of 1456 204 cmd.exe atltartv.exe PID 204 wrote to memory of 1456 204 cmd.exe atltartv.exe PID 1456 wrote to memory of 4092 1456 atltartv.exe svchost.exe PID 1456 wrote to memory of 4092 1456 atltartv.exe svchost.exe PID 1456 wrote to memory of 4092 1456 atltartv.exe svchost.exe PID 1456 wrote to memory of 4092 1456 atltartv.exe svchost.exe PID 1456 wrote to memory of 4092 1456 atltartv.exe svchost.exe PID 4092 wrote to memory of 3040 4092 svchost.exe Explorer.EXE PID 4092 wrote to memory of 3040 4092 svchost.exe Explorer.EXE PID 4092 wrote to memory of 3040 4092 svchost.exe Explorer.EXE PID 3040 wrote to memory of 3500 3040 Explorer.EXE RuntimeBroker.exe PID 3040 wrote to memory of 3500 3040 Explorer.EXE RuntimeBroker.exe PID 3040 wrote to memory of 3500 3040 Explorer.EXE RuntimeBroker.exe PID 3040 wrote to memory of 816 3040 Explorer.EXE cmd.exe PID 3040 wrote to memory of 816 3040 Explorer.EXE cmd.exe PID 816 wrote to memory of 3960 816 cmd.exe nslookup.exe PID 816 wrote to memory of 3960 816 cmd.exe nslookup.exe PID 3040 wrote to memory of 3992 3040 Explorer.EXE cmd.exe PID 3040 wrote to memory of 3992 3040 Explorer.EXE cmd.exe PID 3040 wrote to memory of 2708 3040 Explorer.EXE WinMail.exe PID 3040 wrote to memory of 2708 3040 Explorer.EXE WinMail.exe PID 3040 wrote to memory of 2708 3040 Explorer.EXE WinMail.exe PID 3040 wrote to memory of 2708 3040 Explorer.EXE WinMail.exe PID 3040 wrote to memory of 2708 3040 Explorer.EXE WinMail.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A45A\522D.bat" "C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe"C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4092
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\3E5.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3960
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3E5.bi1"2⤵PID:3992
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:2708
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
67a173408db29be821b9fe2421000340
SHA171faba974dc8fbbb67fa955142c30fbe0cd149a4
SHA256b087d5699a034d5a48b918a3aec8b8d8551569332f1f109d5c92177fcceaada8
SHA512e969d9e43819fdf55ed7588a7df6e2e0a1d8c9ea91444975f5fefaa77155fb7728a94f0ab1bb4a1897e699201c2b1128ae9065c06e1cd57246dd3ae3c7c71671
-
MD5
67a173408db29be821b9fe2421000340
SHA171faba974dc8fbbb67fa955142c30fbe0cd149a4
SHA256b087d5699a034d5a48b918a3aec8b8d8551569332f1f109d5c92177fcceaada8
SHA512e969d9e43819fdf55ed7588a7df6e2e0a1d8c9ea91444975f5fefaa77155fb7728a94f0ab1bb4a1897e699201c2b1128ae9065c06e1cd57246dd3ae3c7c71671
-
MD5
7997e76073126b808d31e0e61e6b9b3b
SHA10944c039c0440740f3be72e66f4d21d93b26a483
SHA256ecec2b47a3ddb2e506e47c9f2403ae4dde5b6eff5f700f8f0ceff9902ed6bb7d
SHA5125a850278e35d9d32611487bf3750ab1910090528188315a454346e26ad4a5f5aacb494d9c316dbdc06acae6d85c7ea32adedc832a0a8c560b19c5f0f47f7a1d0
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
SHA1808955643df13e421c270e377c819cde4dd2c845
SHA256522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
SHA512f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
SHA1808955643df13e421c270e377c819cde4dd2c845
SHA256522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
SHA512f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604