Analysis

  • max time kernel
    122s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    24-11-2020 02:32

General

  • Target

    6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe

  • Size

    1.1MB

  • MD5

    25ca92613089d713e77e03140bfc2e46

  • SHA1

    3918be6a75063293154ab39e8a8735bd79283213

  • SHA256

    6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4

  • SHA512

    106e96f3f312efe0c01a5784c35e766cfb6a8c1b50da876accbe92120ec84a579aab81651233b1c68492ba17f0860b2c18ef93203f50298aa56ec6c8862f4ba5

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 75 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe
    "C:\Users\Admin\AppData\Local\Temp\6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo yAvKCDDZU
      2⤵
        PID:1352
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < jDEfkEXjdkpsYDsjiTiclOLsjvLnRCqj.ehVayaShFInxDvDcZMznplnRjeOTmcNkWvWdcUwBgiFyhXJ
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1676
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 ureO.aly
            4⤵
            • Runs ping.exe
            PID:1608
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode vgVzFIdoNRePPIlFBCwgNBVOGveDdCgG.tnZoBDBTJrNmSXwMUmbvQHUzuNoFMRl RU
            4⤵
              PID:388
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com
              SgrmBroker.com RU
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1060
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com RU
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:1108
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exe
                  6⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies system certificate store
                  • Suspicious use of WriteProcessMemory
                  PID:336
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\wcsauqrdy.exe"
                    7⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:1420
                    • C:\Users\Admin\AppData\Local\Temp\wcsauqrdy.exe
                      "C:\Users\Admin\AppData\Local\Temp\wcsauqrdy.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:1688
                      • C:\Windows\SysWOW64\rundll32.exe
                        C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\A3D902~1.DLL,A C:\Users\Admin\AppData\Local\Temp\WCSAUQ~1.EXE
                        9⤵
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:388
                        • C:\Windows\SysWOW64\RUNDLL32.EXE
                          C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\A3D902~1.DLL,lDZeNA==
                          10⤵
                          • Blacklisted process makes network request
                          • Loads dropped DLL
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of WriteProcessMemory
                          PID:300
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp9FC8.tmp.ps1"
                            11⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:668
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpB6E3.tmp.ps1"
                            11⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1516
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\pmodxaluwnr.exe"
                    7⤵
                      PID:948
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\fkhacblbiwkl.exe"
                      7⤵
                        PID:1964
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  4⤵
                  • Runs ping.exe
                  PID:924

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/300-55-0x0000000003580000-0x0000000003581000-memory.dmp

            Filesize

            4KB

          • memory/300-56-0x0000000003580000-0x0000000003581000-memory.dmp

            Filesize

            4KB

          • memory/300-51-0x0000000003580000-0x0000000003581000-memory.dmp

            Filesize

            4KB

          • memory/300-52-0x0000000003580000-0x0000000003581000-memory.dmp

            Filesize

            4KB

          • memory/300-53-0x0000000003580000-0x0000000003581000-memory.dmp

            Filesize

            4KB

          • memory/300-54-0x0000000003580000-0x0000000003581000-memory.dmp

            Filesize

            4KB

          • memory/300-46-0x00000000025F0000-0x0000000002C48000-memory.dmp

            Filesize

            6.3MB

          • memory/336-22-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/336-19-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/388-40-0x0000000002700000-0x0000000002D58000-memory.dmp

            Filesize

            6.3MB

          • memory/620-23-0x000007FEF5D50000-0x000007FEF5FCA000-memory.dmp

            Filesize

            2.5MB

          • memory/668-60-0x00000000722A0000-0x000000007298E000-memory.dmp

            Filesize

            6.9MB

          • memory/668-64-0x00000000053B0000-0x00000000053B1000-memory.dmp

            Filesize

            4KB

          • memory/668-63-0x0000000002620000-0x0000000002621000-memory.dmp

            Filesize

            4KB

          • memory/668-62-0x00000000049A0000-0x00000000049A1000-memory.dmp

            Filesize

            4KB

          • memory/668-61-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

            Filesize

            4KB

          • memory/1516-69-0x0000000072080000-0x000000007276E000-memory.dmp

            Filesize

            6.9MB

          • memory/1516-73-0x0000000005430000-0x0000000005431000-memory.dmp

            Filesize

            4KB

          • memory/1516-72-0x00000000047C0000-0x00000000047C1000-memory.dmp

            Filesize

            4KB

          • memory/1516-71-0x0000000004A60000-0x0000000004A61000-memory.dmp

            Filesize

            4KB

          • memory/1516-70-0x00000000010E0000-0x00000000010E1000-memory.dmp

            Filesize

            4KB

          • memory/1688-33-0x0000000002BC0000-0x0000000002BD1000-memory.dmp

            Filesize

            68KB

          • memory/1688-32-0x0000000002730000-0x0000000002BB5000-memory.dmp

            Filesize

            4.5MB