Analysis
-
max time kernel
129s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-11-2020 18:32
Static task
static1
Behavioral task
behavioral1
Sample
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe
-
Size
365KB
-
MD5
1ec1a06e9206527fa74c5560f1fa71b7
-
SHA1
808955643df13e421c270e377c819cde4dd2c845
-
SHA256
522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2
-
SHA512
f6d860a6b21db89615e90caadcc33734a0c6c1a0953fec6d9c0e9330dfb12d8455536ba7c398e86ed33d5e18490cc58ddae3b0c09733bbd1f58394cb5562c604
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1456 atltartv.exe -
Deletes itself 1 IoCs
pid Process 1456 atltartv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\appmgSup = "C:\\Users\\Admin\\AppData\\Roaming\\amstcca\\atltartv.exe" 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1456 set thread context of 4092 1456 atltartv.exe 83 PID 4092 set thread context of 3040 4092 svchost.exe 57 PID 3040 set thread context of 3500 3040 Explorer.EXE 60 PID 3040 set thread context of 2708 3040 Explorer.EXE 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1456 atltartv.exe 1456 atltartv.exe 3040 Explorer.EXE 3040 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1456 atltartv.exe 4092 svchost.exe 3040 Explorer.EXE 3040 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 Explorer.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3040 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3040 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2932 1048 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe 76 PID 1048 wrote to memory of 2932 1048 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe 76 PID 1048 wrote to memory of 2932 1048 522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe 76 PID 2932 wrote to memory of 204 2932 cmd.exe 78 PID 2932 wrote to memory of 204 2932 cmd.exe 78 PID 2932 wrote to memory of 204 2932 cmd.exe 78 PID 204 wrote to memory of 1456 204 cmd.exe 79 PID 204 wrote to memory of 1456 204 cmd.exe 79 PID 204 wrote to memory of 1456 204 cmd.exe 79 PID 1456 wrote to memory of 4092 1456 atltartv.exe 83 PID 1456 wrote to memory of 4092 1456 atltartv.exe 83 PID 1456 wrote to memory of 4092 1456 atltartv.exe 83 PID 1456 wrote to memory of 4092 1456 atltartv.exe 83 PID 1456 wrote to memory of 4092 1456 atltartv.exe 83 PID 4092 wrote to memory of 3040 4092 svchost.exe 57 PID 4092 wrote to memory of 3040 4092 svchost.exe 57 PID 4092 wrote to memory of 3040 4092 svchost.exe 57 PID 3040 wrote to memory of 3500 3040 Explorer.EXE 60 PID 3040 wrote to memory of 3500 3040 Explorer.EXE 60 PID 3040 wrote to memory of 3500 3040 Explorer.EXE 60 PID 3040 wrote to memory of 816 3040 Explorer.EXE 84 PID 3040 wrote to memory of 816 3040 Explorer.EXE 84 PID 816 wrote to memory of 3960 816 cmd.exe 86 PID 816 wrote to memory of 3960 816 cmd.exe 86 PID 3040 wrote to memory of 3992 3040 Explorer.EXE 87 PID 3040 wrote to memory of 3992 3040 Explorer.EXE 87 PID 3040 wrote to memory of 2708 3040 Explorer.EXE 89 PID 3040 wrote to memory of 2708 3040 Explorer.EXE 89 PID 3040 wrote to memory of 2708 3040 Explorer.EXE 89 PID 3040 wrote to memory of 2708 3040 Explorer.EXE 89 PID 3040 wrote to memory of 2708 3040 Explorer.EXE 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"C:\Users\Admin\AppData\Local\Temp\522b12f425adf3c974452ec25cc35090594cf94ae0f36ef4945c420b322a53a2.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A45A\522D.bat" "C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe"C:\Users\Admin\AppData\Roaming\amstcca\atltartv.exe" "C:\Users\Admin\AppData\Local\Temp\522B12~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4092
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\3E5.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3960
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3E5.bi1"2⤵PID:3992
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:2708
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3500