Analysis

  • max time kernel
    58s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    24-11-2020 02:32

General

  • Target

    a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe

  • Size

    1.1MB

  • MD5

    0d2152118cc580db3dce7244c9ba9663

  • SHA1

    8163955d3a9eb5e8be460da5b0a3b0d1fe8a3191

  • SHA256

    a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8

  • SHA512

    a8eb6ad994e9a1e26a37303cfee1ebd1ad58996909c12819daed19529d1c00c31e5c391362d48a9d4f10bec52c601326b4c0b06d7986cd2bc6bbe29b4abf0e5a

Score
9/10

Malware Config

Signatures

  • ServiceHost packer 8 IoCs

    Detects ServiceHost packer used for .NET malware

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe
    "C:\Users\Admin\AppData\Local\Temp\a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo qjRuHoTvG
      2⤵
        PID:320
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < pzoyjuWNTGixxnxHcGRQMVppcO.jEUBHZbtIgfCMSKASTkwzjfKYjkmhlZKbsKpYtmcWxL
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4228
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4300
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 NovDIn.ElaU
            4⤵
            • Runs ping.exe
            PID:4188
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode hoMwFZhHyUcrWnpiYMSRVzuj.BWsHdkYEUyeLlWDXiAKiMtRBkGFNgjUwA hX
            4⤵
              PID:3744
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\NisSrv.com
              NisSrv.com hX
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3436
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\NisSrv.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\NisSrv.com hX
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:4428
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  6⤵
                  • Executes dropped EXE
                  PID:876
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 1048
                    7⤵
                    • Program crash
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4664
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 3
              4⤵
              • Runs ping.exe
              PID:1664
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
          2⤵
            PID:4512

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/876-18-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/876-21-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/4664-27-0x0000000004680000-0x0000000004681000-memory.dmp

          Filesize

          4KB

        • memory/4664-25-0x0000000004680000-0x0000000004681000-memory.dmp

          Filesize

          4KB

        • memory/4664-36-0x0000000004B30000-0x0000000004B31000-memory.dmp

          Filesize

          4KB