Analysis

  • max time kernel
    145s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-11-2020 15:25

General

  • Target

    a6a834577bb0b73aa6ace98a9568d99d.exe

  • Size

    1.0MB

  • MD5

    7beb1980ff04112de36431a6d35e369d

  • SHA1

    1e557eb4af6c48a37899391c01e925960c031883

  • SHA256

    193d21917af44dca2a3917f4932f3e61877e5a5e6a9f8b2e7338e2b5d4ba0d88

  • SHA512

    e3f2aaaedb52c3d05e261d1c8e90503fd69abdc3c7cf53afba4baaa7fba78545a0eb8bfc3830b190a337c3a41f5b06d388af3f9f50aa979b3905ba2c852e2f67

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blacklisted process makes network request 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 60051 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3108
      • C:\Users\Admin\AppData\Local\Temp\a6a834577bb0b73aa6ace98a9568d99d.exe
        "C:\Users\Admin\AppData\Local\Temp\a6a834577bb0b73aa6ace98a9568d99d.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < tivNBahuGkfZnXCDDyWmgCpPTpgnqDftuQ.JbqIMiWExzwXhRzWwzElBXHTstOueVlTIsSuDv
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5048
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4140
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 1 DuqYAYUt.DuqYAYUt
              5⤵
              • Runs ping.exe
              PID:1532
            • C:\Windows\SysWOW64\certutil.exe
              certutil -decode dTiuhMGXxbGrTyPfEaVSNiuANPcsWAuTgx.pRMcRvaXQRWVHiQtrJIKpNGzns Ta
              5⤵
                PID:3704
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\explorer.com
                explorer.com Ta
                5⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4208
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\explorer.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\explorer.com Ta
                  6⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:756
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 3
                5⤵
                • Runs ping.exe
                PID:3128
        • C:\Windows\SysWOW64\attrib.exe
          C:\Windows\SysWOW64\attrib.exe
          2⤵
          • Checks processor information in registry
          • Views/modifies file attributes
          PID:4092
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ttqaale.exe"
            3⤵
              PID:4048
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\fbuorfus.exe"
              3⤵
                PID:4440
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\bucrbxklstc.exe"
                3⤵
                  PID:584
                  • C:\Users\Admin\AppData\Local\Temp\bucrbxklstc.exe
                    "C:\Users\Admin\AppData\Local\Temp\bucrbxklstc.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:896
                    • C:\Windows\SysWOW64\rundll32.exe
                      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL,A C:\Users\Admin\AppData\Local\Temp\BUCRBX~1.EXE
                      5⤵
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:812
                      • C:\Windows\SysWOW64\RUNDLL32.EXE
                        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL,YUIfLDZWBUQ=
                        6⤵
                        • Blacklisted process makes network request
                        • Loads dropped DLL
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        PID:1244
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp4B6C.tmp.ps1"
                          7⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2236
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp609C.tmp.ps1"
                          7⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4592

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Hidden Files and Directories

            1
            T1158

            Defense Evasion

            Modify Registry

            1
            T1112

            Hidden Files and Directories

            1
            T1158

            Credential Access

            Credentials in Files

            1
            T1081

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            1
            T1082

            Remote System Discovery

            1
            T1018

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
              MD5

              0f5cbdca905beb13bebdcf43fb0716bd

              SHA1

              9e136131389fde83297267faf6c651d420671b3f

              SHA256

              a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060

              SHA512

              a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
              MD5

              ff51d55bfbb37295326bbfbfe04fb8de

              SHA1

              4c47c7cf03f4a538ade3bbe7a6d8a3cff0d9c474

              SHA256

              1b8cc04a5e51a9fe2a15877dab0be850441a2b7bcdbbc08acdb5aa8581877fd0

              SHA512

              31f3f0b4191cedbec4e6e0bbc6a08051cea4a28db4049561287b6e2ddc3b18ae4b9bea939b8d3ed075cac9c37a6f0ffdad363375696aef24f6a4842ba3462f27

            • C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL
              MD5

              2dcd48ad182b551c2ff3963f799e2c45

              SHA1

              1e5063fe01d984397d66ca3cc959f1d3f19c1a37

              SHA256

              96a803b3730ee280417d110fa94e1fd024eb2df0189aa85278b929399c22111a

              SHA512

              daacd9545cdfde6f4c5d2bfb116b5a79ebca191893145fb9406e72dad0327aa8bcf1c3ad45b9bd1330d6af02465c93af1e1f92f04442ede0e3f9c369c616cef6

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KupuVeTCyBuoEfimWgZQURoXWzSIuJMcKT.ubxtPHBrXohaUDWzIZQES
              MD5

              4b370384a4b27ffc655d9f23a8a4cc10

              SHA1

              110f41471b356424137d086c8cd7e21d13c3be6d

              SHA256

              b2292b52643af40cf48706f67788bda06299447f29f8dbeab30a2fb48b6681b3

              SHA512

              5e09298186d02cefa595c322fc04eab435f0eef9ed1f4db8b58e077724293980824b8df7034c518734d37be3c2e733795e400ffd5518345c49c549a9c167187f

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ta
              MD5

              36507ca429f4ff3d3612d6b70dd18454

              SHA1

              2a393327a753fbba7faa66024caba54ff43a7a2a

              SHA256

              3e360fd119496d5000740ac0c6258ceb6939e9a630a77fcbf5fb6b211a6e8ccc

              SHA512

              8f5fe3ed8b8fb094f6c300a3665e182958d92f1a670ecd29e4795eabf00304e1b126bd0f2a4ad14d41765abb06e4f1243a20faa899f8da171b39eb2e08b46999

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dTiuhMGXxbGrTyPfEaVSNiuANPcsWAuTgx.pRMcRvaXQRWVHiQtrJIKpNGzns
              MD5

              769a411c1cfb4a2453b589a05f0f14f2

              SHA1

              53a40b0718dd3f410c9413dc69777d5fc8dfcd20

              SHA256

              9d264bb0f813569daccea73ad336cd700b49de615a3ec79d62df2f575bff062a

              SHA512

              e76b7fc664abbe1f98ddb57d8507bba3c693ca6e0d6f7433663bff3f972d7ff526961d6047615af0456c8f9b7adb4d2a7992970b1af5264498a3505849b6f886

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\explorer.com
              MD5

              e7dbc29175aa7c5a78cf12966aafab20

              SHA1

              6194bdff440ba264514b88ba124da78553603cc8

              SHA256

              3073e2e587dd9b13cedaa20401d69f2533d03e1e946f091d8556474b8579e4c5

              SHA512

              29de405873cb65d23fadee46773e5018de23a2674f35b08cb2db388fe2c39d7667ba9a45764ca98db40cfcfe68a8cc5675d4691d542def2ef3896c72e1193af9

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\explorer.com
              MD5

              e7dbc29175aa7c5a78cf12966aafab20

              SHA1

              6194bdff440ba264514b88ba124da78553603cc8

              SHA256

              3073e2e587dd9b13cedaa20401d69f2533d03e1e946f091d8556474b8579e4c5

              SHA512

              29de405873cb65d23fadee46773e5018de23a2674f35b08cb2db388fe2c39d7667ba9a45764ca98db40cfcfe68a8cc5675d4691d542def2ef3896c72e1193af9

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\explorer.com
              MD5

              e7dbc29175aa7c5a78cf12966aafab20

              SHA1

              6194bdff440ba264514b88ba124da78553603cc8

              SHA256

              3073e2e587dd9b13cedaa20401d69f2533d03e1e946f091d8556474b8579e4c5

              SHA512

              29de405873cb65d23fadee46773e5018de23a2674f35b08cb2db388fe2c39d7667ba9a45764ca98db40cfcfe68a8cc5675d4691d542def2ef3896c72e1193af9

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pzOkPIqYypftcUgppklCEcyHo.PHGBUSmPGkrMvBCjyjuKfDvrSRsGFNhie
              MD5

              196a547c5ded2b2bf6ccd1db12d51191

              SHA1

              4bc6dd197eedbe889ecbf550da12954381e3e1e1

              SHA256

              9f7a58524090bf466870019014ef9b5baad4986e5afd85a835238332a61f7070

              SHA512

              00281a4423cd32ecdfaceef8549a33853d35ea7f44eaf14712502ec762995d92b5d3897478f9cf46336c15a98a1ecd0356a363099e5690fed3e1593d7d6abef2

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tivNBahuGkfZnXCDDyWmgCpPTpgnqDftuQ.JbqIMiWExzwXhRzWwzElBXHTstOueVlTIsSuDv
              MD5

              167d4bc8d258c4f59d1502917fbf743a

              SHA1

              c06369bf4cc8fc2e3a37840712de1dbb2ea3e7aa

              SHA256

              1ceb605f07415f1a313377c693cb48e74532cac84ef41edee14af5da08202363

              SHA512

              be0f742e3fbad0eaf5f3ba2039015f5941a4619054eda051ef541b1c637691c9dc1e86bf5efef419b29a09920d0c384ed9ef8b39dc38035b3100a0cfe4bc0ac2

            • C:\Users\Admin\AppData\Local\Temp\bucrbxklstc.exe
              MD5

              40d65d4355714d619d5e4cf2a19fea5d

              SHA1

              d14121d96037bdded3f88a9bc754dad5df364366

              SHA256

              7062ad070c353e2ea9cf2aff2d3a31abd6c595d5d90a9b8622360d3772779159

              SHA512

              b03b30bc48e0ca65496812a5d2458ed61fcda9a3f9edeab13e03541df9e35edaf0f37113381a9ead276c34bbe7b675488f3c1134dca1f6184ca550fa8329c97e

            • C:\Users\Admin\AppData\Local\Temp\bucrbxklstc.exe
              MD5

              40d65d4355714d619d5e4cf2a19fea5d

              SHA1

              d14121d96037bdded3f88a9bc754dad5df364366

              SHA256

              7062ad070c353e2ea9cf2aff2d3a31abd6c595d5d90a9b8622360d3772779159

              SHA512

              b03b30bc48e0ca65496812a5d2458ed61fcda9a3f9edeab13e03541df9e35edaf0f37113381a9ead276c34bbe7b675488f3c1134dca1f6184ca550fa8329c97e

            • C:\Users\Admin\AppData\Local\Temp\tmp4B6C.tmp.ps1
              MD5

              70d54960a3c1a9b843267f28499fe892

              SHA1

              2a370e5f0c77129b5d5c0ead0931b8c2aca3f826

              SHA256

              ee3319204012c82c5c2855aec11199a0994fd15814241fb4d8bf109be8c278b8

              SHA512

              c8d485882e24dd615178174271f084232d5b3145b8a11cca425db961609b05bdd8ca4d078fbb333c75f23d80b5e063fb979f00f3b40b217edb92c8cdf3ca732f

            • C:\Users\Admin\AppData\Local\Temp\tmp609C.tmp.ps1
              MD5

              cb6f6a8e266ee62e2ccb70d4bf965c47

              SHA1

              33254044ff301f6375aeaa6ee92237be7a63cd32

              SHA256

              cb3fa83cb472213f9bdcc824bfb629d85e178b97fa68fa4224175c13a9103363

              SHA512

              40e9b8fe63b5b3be87ea4e88d3443e771299bd341b362f23f07cadf573de796c8a44b34c4c9e81bc73eb2d63132415b304ea07e5881c20e309bcc9c035b56edb

            • \Users\Admin\AppData\Local\Temp\3B4770~1.DLL
              MD5

              2dcd48ad182b551c2ff3963f799e2c45

              SHA1

              1e5063fe01d984397d66ca3cc959f1d3f19c1a37

              SHA256

              96a803b3730ee280417d110fa94e1fd024eb2df0189aa85278b929399c22111a

              SHA512

              daacd9545cdfde6f4c5d2bfb116b5a79ebca191893145fb9406e72dad0327aa8bcf1c3ad45b9bd1330d6af02465c93af1e1f92f04442ede0e3f9c369c616cef6

            • \Users\Admin\AppData\Local\Temp\3B4770~1.DLL
              MD5

              2dcd48ad182b551c2ff3963f799e2c45

              SHA1

              1e5063fe01d984397d66ca3cc959f1d3f19c1a37

              SHA256

              96a803b3730ee280417d110fa94e1fd024eb2df0189aa85278b929399c22111a

              SHA512

              daacd9545cdfde6f4c5d2bfb116b5a79ebca191893145fb9406e72dad0327aa8bcf1c3ad45b9bd1330d6af02465c93af1e1f92f04442ede0e3f9c369c616cef6

            • \Users\Admin\AppData\Local\Temp\3B4770~1.DLL
              MD5

              2dcd48ad182b551c2ff3963f799e2c45

              SHA1

              1e5063fe01d984397d66ca3cc959f1d3f19c1a37

              SHA256

              96a803b3730ee280417d110fa94e1fd024eb2df0189aa85278b929399c22111a

              SHA512

              daacd9545cdfde6f4c5d2bfb116b5a79ebca191893145fb9406e72dad0327aa8bcf1c3ad45b9bd1330d6af02465c93af1e1f92f04442ede0e3f9c369c616cef6

            • \Users\Admin\AppData\Local\Temp\3B4770~1.DLL
              MD5

              2dcd48ad182b551c2ff3963f799e2c45

              SHA1

              1e5063fe01d984397d66ca3cc959f1d3f19c1a37

              SHA256

              96a803b3730ee280417d110fa94e1fd024eb2df0189aa85278b929399c22111a

              SHA512

              daacd9545cdfde6f4c5d2bfb116b5a79ebca191893145fb9406e72dad0327aa8bcf1c3ad45b9bd1330d6af02465c93af1e1f92f04442ede0e3f9c369c616cef6

            • memory/584-20-0x0000000000000000-mapping.dmp
            • memory/756-11-0x0000000000000000-mapping.dmp
            • memory/812-30-0x0000000004DE0000-0x0000000005438000-memory.dmp
              Filesize

              6.3MB

            • memory/812-26-0x0000000000000000-mapping.dmp
            • memory/896-22-0x0000000000000000-mapping.dmp
            • memory/896-21-0x0000000000000000-mapping.dmp
            • memory/896-25-0x0000000002AD0000-0x0000000002AD1000-memory.dmp
              Filesize

              4KB

            • memory/1244-39-0x0000000004C50000-0x00000000052A8000-memory.dmp
              Filesize

              6.3MB

            • memory/1244-36-0x0000000000000000-mapping.dmp
            • memory/1532-3-0x0000000000000000-mapping.dmp
            • memory/2236-44-0x0000000000000000-mapping.dmp
            • memory/2236-50-0x00000000078F0000-0x00000000078F1000-memory.dmp
              Filesize

              4KB

            • memory/2236-54-0x0000000008040000-0x0000000008041000-memory.dmp
              Filesize

              4KB

            • memory/2236-53-0x0000000007FF0000-0x0000000007FF1000-memory.dmp
              Filesize

              4KB

            • memory/2236-52-0x0000000007CF0000-0x0000000007CF1000-memory.dmp
              Filesize

              4KB

            • memory/2236-51-0x0000000007960000-0x0000000007961000-memory.dmp
              Filesize

              4KB

            • memory/2236-45-0x0000000071110000-0x00000000717FE000-memory.dmp
              Filesize

              6.9MB

            • memory/2236-46-0x00000000044B0000-0x00000000044B1000-memory.dmp
              Filesize

              4KB

            • memory/2236-47-0x0000000007100000-0x0000000007101000-memory.dmp
              Filesize

              4KB

            • memory/2236-48-0x0000000006EB0000-0x0000000006EB1000-memory.dmp
              Filesize

              4KB

            • memory/2236-49-0x0000000007830000-0x0000000007831000-memory.dmp
              Filesize

              4KB

            • memory/3128-9-0x0000000000000000-mapping.dmp
            • memory/3704-5-0x0000000000000000-mapping.dmp
            • memory/4048-18-0x0000000000000000-mapping.dmp
            • memory/4092-17-0x0000000014A60000-0x0000000014A88000-memory.dmp
              Filesize

              160KB

            • memory/4092-15-0x0000000014A60000-0x0000000014A88000-memory.dmp
              Filesize

              160KB

            • memory/4140-2-0x0000000000000000-mapping.dmp
            • memory/4208-7-0x0000000000000000-mapping.dmp
            • memory/4440-19-0x0000000000000000-mapping.dmp
            • memory/4592-56-0x0000000000000000-mapping.dmp
            • memory/4592-64-0x00000000083E0000-0x00000000083E1000-memory.dmp
              Filesize

              4KB

            • memory/4592-58-0x0000000070D60000-0x000000007144E000-memory.dmp
              Filesize

              6.9MB

            • memory/4592-67-0x0000000008C40000-0x0000000008C41000-memory.dmp
              Filesize

              4KB

            • memory/5048-0-0x0000000000000000-mapping.dmp