Overview
overview
10Static
static
8197f0e170f...2a.exe
windows7_x64
9197f0e170f...2a.exe
windows10_x64
9302d77c6ec...56.exe
windows7_x64
8302d77c6ec...56.exe
windows10_x64
8466d872ddb...0d.exe
windows7_x64
8466d872ddb...0d.exe
windows10_x64
106d13a07022...f4.exe
windows7_x64
86d13a07022...f4.exe
windows10_x64
88c1d1de824...ef.exe
windows7_x64
18c1d1de824...ef.exe
windows10_x64
1a31f1894f1...b8.exe
windows7_x64
8a31f1894f1...b8.exe
windows10_x64
9a3802c3a05...6d.exe
windows7_x64
10a3802c3a05...6d.exe
windows10_x64
10Android APK
android_x86_64
10c6c0d4969a...36.exe
windows7_x64
1c6c0d4969a...36.exe
windows10_x64
1d92ef7281e...1a.exe
windows7_x64
1d92ef7281e...1a.exe
windows10_x64
1dffb2eaccb...3a.exe
windows7_x64
8dffb2eaccb...3a.exe
windows10_x64
8e247b061c8...b1.exe
windows7_x64
8e247b061c8...b1.exe
windows10_x64
8Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-11-2020 02:32
Static task
static1
Behavioral task
behavioral1
Sample
197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
302d77c6ec68c07741be2ae0d0c26bc88c85f525c8e3766ebf23dba34802f956.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
302d77c6ec68c07741be2ae0d0c26bc88c85f525c8e3766ebf23dba34802f956.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
466d872ddb9f8ce7db8d16d171b9ba398f99c98c79e63396760cda7426d9460d.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
466d872ddb9f8ce7db8d16d171b9ba398f99c98c79e63396760cda7426d9460d.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
8c1d1de824c079bfec155f05b5f24fd4e1c64c015286ac417b3a587124d743ef.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
8c1d1de824c079bfec155f05b5f24fd4e1c64c015286ac417b3a587124d743ef.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe
Resource
win7v20201028
Behavioral task
behavioral14
Sample
a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
af82bed2c58c403908faf323310cf6a65a7e3bfe098cc930eb5ac4bfe9315ef4.apk
Resource
android-x86_64
Behavioral task
behavioral16
Sample
c6c0d4969ac74cdc574fae3ace12a4ad64858ec5ab292733ae78fd3d04696536.exe
Resource
win7v20201028
Behavioral task
behavioral17
Sample
c6c0d4969ac74cdc574fae3ace12a4ad64858ec5ab292733ae78fd3d04696536.exe
Resource
win10v20201028
Behavioral task
behavioral18
Sample
d92ef7281e3b5145835ffa17ff869c5569011ffb9ad327eeecfddebe31cdc31a.exe
Resource
win7v20201028
Behavioral task
behavioral19
Sample
d92ef7281e3b5145835ffa17ff869c5569011ffb9ad327eeecfddebe31cdc31a.exe
Resource
win10v20201028
Behavioral task
behavioral20
Sample
dffb2eaccbbfd1077d7679ecba62bb75de32259c70e28a84b32750fdfb17e13a.exe
Resource
win7v20201028
Behavioral task
behavioral21
Sample
dffb2eaccbbfd1077d7679ecba62bb75de32259c70e28a84b32750fdfb17e13a.exe
Resource
win10v20201028
Behavioral task
behavioral22
Sample
e247b061c89190fa7fec3ce419b3ed58e088db8a58fa40fc208d3995b149adb1.exe
Resource
win7v20201028
Behavioral task
behavioral23
Sample
e247b061c89190fa7fec3ce419b3ed58e088db8a58fa40fc208d3995b149adb1.exe
Resource
win10v20201028
General
-
Target
6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe
-
Size
1.1MB
-
MD5
25ca92613089d713e77e03140bfc2e46
-
SHA1
3918be6a75063293154ab39e8a8735bd79283213
-
SHA256
6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4
-
SHA512
106e96f3f312efe0c01a5784c35e766cfb6a8c1b50da876accbe92120ec84a579aab81651233b1c68492ba17f0860b2c18ef93203f50298aa56ec6c8862f4ba5
Malware Config
Signatures
-
Blacklisted process makes network request 1 IoCs
flow pid Process 29 868 RUNDLL32.EXE -
Executes dropped EXE 4 IoCs
pid Process 2588 SgrmBroker.com 3480 SgrmBroker.com 1424 ftp.exe 2540 dhaqkpwfb.exe -
Loads dropped DLL 3 IoCs
pid Process 2880 rundll32.exe 868 RUNDLL32.EXE 868 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3480 set thread context of 1424 3480 SgrmBroker.com 88 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ftp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ftp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3700 PING.EXE 184 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3220 powershell.exe 3220 powershell.exe 3220 powershell.exe 868 RUNDLL32.EXE 868 RUNDLL32.EXE 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3480 SgrmBroker.com -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2880 rundll32.exe Token: SeDebugPrivilege 868 RUNDLL32.EXE Token: SeDebugPrivilege 3220 powershell.exe Token: SeDebugPrivilege 1812 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 868 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 988 wrote to memory of 2460 988 6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe 74 PID 988 wrote to memory of 2460 988 6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe 74 PID 988 wrote to memory of 2460 988 6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe 74 PID 988 wrote to memory of 2500 988 6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe 76 PID 988 wrote to memory of 2500 988 6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe 76 PID 988 wrote to memory of 2500 988 6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe 76 PID 2500 wrote to memory of 2992 2500 cmd.exe 78 PID 2500 wrote to memory of 2992 2500 cmd.exe 78 PID 2500 wrote to memory of 2992 2500 cmd.exe 78 PID 2992 wrote to memory of 3700 2992 cmd.exe 80 PID 2992 wrote to memory of 3700 2992 cmd.exe 80 PID 2992 wrote to memory of 3700 2992 cmd.exe 80 PID 2992 wrote to memory of 824 2992 cmd.exe 81 PID 2992 wrote to memory of 824 2992 cmd.exe 81 PID 2992 wrote to memory of 824 2992 cmd.exe 81 PID 2992 wrote to memory of 2588 2992 cmd.exe 82 PID 2992 wrote to memory of 2588 2992 cmd.exe 82 PID 2992 wrote to memory of 2588 2992 cmd.exe 82 PID 2992 wrote to memory of 184 2992 cmd.exe 83 PID 2992 wrote to memory of 184 2992 cmd.exe 83 PID 2992 wrote to memory of 184 2992 cmd.exe 83 PID 2588 wrote to memory of 3480 2588 SgrmBroker.com 84 PID 2588 wrote to memory of 3480 2588 SgrmBroker.com 84 PID 2588 wrote to memory of 3480 2588 SgrmBroker.com 84 PID 3480 wrote to memory of 1424 3480 SgrmBroker.com 88 PID 3480 wrote to memory of 1424 3480 SgrmBroker.com 88 PID 3480 wrote to memory of 1424 3480 SgrmBroker.com 88 PID 3480 wrote to memory of 1424 3480 SgrmBroker.com 88 PID 1424 wrote to memory of 796 1424 ftp.exe 89 PID 1424 wrote to memory of 796 1424 ftp.exe 89 PID 1424 wrote to memory of 796 1424 ftp.exe 89 PID 796 wrote to memory of 2540 796 cmd.exe 91 PID 796 wrote to memory of 2540 796 cmd.exe 91 PID 796 wrote to memory of 2540 796 cmd.exe 91 PID 2540 wrote to memory of 2880 2540 dhaqkpwfb.exe 92 PID 2540 wrote to memory of 2880 2540 dhaqkpwfb.exe 92 PID 2540 wrote to memory of 2880 2540 dhaqkpwfb.exe 92 PID 2880 wrote to memory of 868 2880 rundll32.exe 93 PID 2880 wrote to memory of 868 2880 rundll32.exe 93 PID 2880 wrote to memory of 868 2880 rundll32.exe 93 PID 868 wrote to memory of 3220 868 RUNDLL32.EXE 94 PID 868 wrote to memory of 3220 868 RUNDLL32.EXE 94 PID 868 wrote to memory of 3220 868 RUNDLL32.EXE 94 PID 1424 wrote to memory of 1232 1424 ftp.exe 96 PID 1424 wrote to memory of 1232 1424 ftp.exe 96 PID 1424 wrote to memory of 1232 1424 ftp.exe 96 PID 868 wrote to memory of 1812 868 RUNDLL32.EXE 99 PID 868 wrote to memory of 1812 868 RUNDLL32.EXE 99 PID 868 wrote to memory of 1812 868 RUNDLL32.EXE 99 PID 1424 wrote to memory of 2476 1424 ftp.exe 101 PID 1424 wrote to memory of 2476 1424 ftp.exe 101 PID 1424 wrote to memory of 2476 1424 ftp.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe"C:\Users\Admin\AppData\Local\Temp\6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo yAvKCDDZU2⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < jDEfkEXjdkpsYDsjiTiclOLsjvLnRCqj.ehVayaShFInxDvDcZMznplnRjeOTmcNkWvWdcUwBgiFyhXJ2⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\PING.EXEping -n 1 ureO.aly4⤵
- Runs ping.exe
PID:3700
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode vgVzFIdoNRePPIlFBCwgNBVOGveDdCgG.tnZoBDBTJrNmSXwMUmbvQHUzuNoFMRl RU4⤵PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.comSgrmBroker.com RU4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com RU5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exe6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe"C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL,A C:\Users\Admin\AppData\Local\Temp\DHAQKP~1.EXE9⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL,SyckfI0=10⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpB641.tmp.ps1"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpC5E3.tmp.ps1"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\eohhxnqu.exe"7⤵PID:1232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\vtrpnwhteqks.exe"7⤵PID:2476
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
PID:184
-
-
-