Analysis

  • max time kernel
    62s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    24-11-2020 02:32

General

  • Target

    a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe

  • Size

    1.1MB

  • MD5

    0d2152118cc580db3dce7244c9ba9663

  • SHA1

    8163955d3a9eb5e8be460da5b0a3b0d1fe8a3191

  • SHA256

    a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8

  • SHA512

    a8eb6ad994e9a1e26a37303cfee1ebd1ad58996909c12819daed19529d1c00c31e5c391362d48a9d4f10bec52c601326b4c0b06d7986cd2bc6bbe29b4abf0e5a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe
    "C:\Users\Admin\AppData\Local\Temp\a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo qjRuHoTvG
      2⤵
        PID:1256
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < pzoyjuWNTGixxnxHcGRQMVppcO.jEUBHZbtIgfCMSKASTkwzjfKYjkmhlZKbsKpYtmcWxL
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:580
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1124
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 NovDIn.ElaU
            4⤵
            • Runs ping.exe
            PID:1452
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode hoMwFZhHyUcrWnpiYMSRVzuj.BWsHdkYEUyeLlWDXiAKiMtRBkGFNgjUwA hX
            4⤵
              PID:564
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\NisSrv.com
              NisSrv.com hX
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1744
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\NisSrv.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\NisSrv.com hX
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:240
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  6⤵
                  • Executes dropped EXE
                  PID:1436
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 3
              4⤵
              • Runs ping.exe
              PID:1668
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
          2⤵
          • Deletes itself
          PID:1004

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1404-25-0x000007FEF81B0000-0x000007FEF842A000-memory.dmp

        Filesize

        2.5MB

      • memory/1436-21-0x0000000000400000-0x0000000000437000-memory.dmp

        Filesize

        220KB

      • memory/1436-24-0x0000000000400000-0x0000000000437000-memory.dmp

        Filesize

        220KB