Analysis

  • max time kernel
    145s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    24-11-2020 02:32

General

  • Target

    6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe

  • Size

    1.1MB

  • MD5

    25ca92613089d713e77e03140bfc2e46

  • SHA1

    3918be6a75063293154ab39e8a8735bd79283213

  • SHA256

    6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4

  • SHA512

    106e96f3f312efe0c01a5784c35e766cfb6a8c1b50da876accbe92120ec84a579aab81651233b1c68492ba17f0860b2c18ef93203f50298aa56ec6c8862f4ba5

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe
    "C:\Users\Admin\AppData\Local\Temp\6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo yAvKCDDZU
      2⤵
        PID:2460
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < jDEfkEXjdkpsYDsjiTiclOLsjvLnRCqj.ehVayaShFInxDvDcZMznplnRjeOTmcNkWvWdcUwBgiFyhXJ
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 ureO.aly
            4⤵
            • Runs ping.exe
            PID:3700
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode vgVzFIdoNRePPIlFBCwgNBVOGveDdCgG.tnZoBDBTJrNmSXwMUmbvQHUzuNoFMRl RU
            4⤵
              PID:824
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com
              SgrmBroker.com RU
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2588
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com RU
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:3480
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exe
                  6⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Suspicious use of WriteProcessMemory
                  PID:1424
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:796
                    • C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe
                      "C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:2540
                      • C:\Windows\SysWOW64\rundll32.exe
                        C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL,A C:\Users\Admin\AppData\Local\Temp\DHAQKP~1.EXE
                        9⤵
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2880
                        • C:\Windows\SysWOW64\RUNDLL32.EXE
                          C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL,SyckfI0=
                          10⤵
                          • Blacklisted process makes network request
                          • Loads dropped DLL
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of WriteProcessMemory
                          PID:868
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpB641.tmp.ps1"
                            11⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3220
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpC5E3.tmp.ps1"
                            11⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1812
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\eohhxnqu.exe"
                    7⤵
                      PID:1232
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\vtrpnwhteqks.exe"
                      7⤵
                        PID:2476
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  4⤵
                  • Runs ping.exe
                  PID:184

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          1
          T1082

          Remote System Discovery

          1
          T1018

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
            MD5

            0f5cbdca905beb13bebdcf43fb0716bd

            SHA1

            9e136131389fde83297267faf6c651d420671b3f

            SHA256

            a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060

            SHA512

            a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            MD5

            a3746a15db04c7e44c31807de7153df7

            SHA1

            b01556e8d7a2d8d033b278ab3503b04e4700188a

            SHA256

            e477dfd98026093dfb92618914ac767b587b177b1929a753b9f3fcfa6cf3942a

            SHA512

            00b4385c33a3a81d4c97d87214cbd10732cbfc82818ab076f94574e37862b82f6589e49d631b1c0caf26ea887d6eb92ec95b4d0ddd931b7e730f3dcf4b310323

          • C:\Users\Admin\AppData\Local\Temp\3B4770~1.DLL
            MD5

            ec867eb16ed355159d44c0658739766d

            SHA1

            c337810cbe2d44cd222dd1b9fb0d3b26714e79cc

            SHA256

            a2e2c09b1e63e387eefed37599dcc6d4ad85d28fded26cf2de36264f8316bf22

            SHA512

            26b0d4c67c1988266bdc0591ff696c2691e4208081aafe1d392c8648ee208346026ab4d6cd00d90bcd9bec055ca7cc9fffee5892e32de6c6a40621aa30428411

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RU
            MD5

            050c3a20f94c6dca32426949772d755b

            SHA1

            cca27288a17ce5ed74d87f904e998bab81546986

            SHA256

            5e25304dcc4bb952ac63eab8275a06101dd17f9e34ccc604053df57d626169a8

            SHA512

            0623546dd0000abd7e86cf86b3efe30ec4eed7af7e52dfe25c96df5000653b15a4c35e1a4bdb1980301bc22f1edab1d1c920e02690aedd11be12f3e71f9f521c

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com
            MD5

            690df215774716b64c246e9551b5f86b

            SHA1

            be106aa4378e9d3c3b63dd019300d135061130ee

            SHA256

            9160e2f41e3fb7c24dabc75804da2b03d737c1a61d870ea6a016af826474d19f

            SHA512

            065f6b47e0a7cfca9280e7052a2c6001e3d2645a1ac33a1dc37d046c5fb7eb4a4dc80220319b5a3d34858e12bc91db6c981837c6fdb069e4d51e1996505cc121

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SgrmBroker.com
            MD5

            690df215774716b64c246e9551b5f86b

            SHA1

            be106aa4378e9d3c3b63dd019300d135061130ee

            SHA256

            9160e2f41e3fb7c24dabc75804da2b03d737c1a61d870ea6a016af826474d19f

            SHA512

            065f6b47e0a7cfca9280e7052a2c6001e3d2645a1ac33a1dc37d046c5fb7eb4a4dc80220319b5a3d34858e12bc91db6c981837c6fdb069e4d51e1996505cc121

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\YznoJTwCOGCmycpnGlCfs.XdLjmzGvJHHviGkwAyMWAqnaqOKEcFOPKgcobvzHW
            MD5

            b66801f8eef442b1e664f189c16e7f78

            SHA1

            241c92e2343630ad6b3d80daf6c96c590f60ed2d

            SHA256

            4b99e26b74e219107c6e804d16cbfb5573fed5e1eeb7c9b6158cc0d89a8b6edd

            SHA512

            1c4c45f2eb1b95c37b710a06f92ee63235895e6e0d2556fdb620bb1406c60f21cb34ca8c6ea2b9d802e1acc4b2566cee8a94119a3a129288727856c67302c96e

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exe
            MD5

            758bf29e5cf411cb73955b513e4350d9

            SHA1

            31cf52e586fd66a88ccc5c83175b01e761c0a496

            SHA256

            90a1c7087b802c939ee00e256a548e3e920ea07c0c3d1c9457da9316a2d3533b

            SHA512

            2102f2cf3f02d71462c1488f82cf6d7b769a9d94eb9ab9fc3ec7495bb682b62514a5d1b97a9728603abff6ddb3472c518e8d6c759429121a6a937faa6b078f98

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ftp.exe
            MD5

            758bf29e5cf411cb73955b513e4350d9

            SHA1

            31cf52e586fd66a88ccc5c83175b01e761c0a496

            SHA256

            90a1c7087b802c939ee00e256a548e3e920ea07c0c3d1c9457da9316a2d3533b

            SHA512

            2102f2cf3f02d71462c1488f82cf6d7b769a9d94eb9ab9fc3ec7495bb682b62514a5d1b97a9728603abff6ddb3472c518e8d6c759429121a6a937faa6b078f98

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\jDEfkEXjdkpsYDsjiTiclOLsjvLnRCqj.ehVayaShFInxDvDcZMznplnRjeOTmcNkWvWdcUwBgiFyhXJ
            MD5

            05c2834e81895a9f3e8d0858cde167e0

            SHA1

            77f7f26b017c91979506851c62cd57e35237d3a9

            SHA256

            b3736d9e69c3a84c4d36d2dda18b2df85a05695d5701b34ce8a9e949f33d9aef

            SHA512

            1fe78dac72c1830f027b4438dde890215945dc7a6943b1c55c8638ea4ca30f74496976381e6318f337b406fac0cc6ba9b53b88eb6eb73f252de79469e036b6d6

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\jKJwwrTSMSlrErMyZoeDBsAisPUdhg.ndylIYVdUwZWcslwHKbveU
            MD5

            fb88af3eb6cba7888d4f44916fe3dfab

            SHA1

            db21e8f751b08ea7b2be54f4bfc495d97b6f67e6

            SHA256

            476c0e3bd6f189f2ddbc062db2867c22f2f7958f983015cc6c61a710998a382c

            SHA512

            8a58bb7cd342bcf1bad983599783fb66af846fabaf68ce3bb8b471638cf459df9cf6f82fd6795f1ab34ca04327738c1358a19b5419eaad3d24a1ed911f1da071

          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\vgVzFIdoNRePPIlFBCwgNBVOGveDdCgG.tnZoBDBTJrNmSXwMUmbvQHUzuNoFMRl
            MD5

            1c26c37c9cc293c5765f074e802108c2

            SHA1

            ccc4d5cabf110d5a8ef46ba97ab0b880d8e4c1ab

            SHA256

            8ebbc9b1b21f1c0efa49af30499fbeaf54b006eb199d011ab73a6d95da4b4233

            SHA512

            ebc956e730080c63cc324bd4eb920ce77c123cd3f3513ef2530b2908bd1681fb1b04ad14ebcd042d04aaaa236b4ba89a602c25ff359069d5d8f4e4ec93eec7c6

          • C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe
            MD5

            4d8b8e29c29d810de67dac8ff101c5ad

            SHA1

            c03a691f88fa1623fab831b3711369054e50bb17

            SHA256

            7d326ce46f8343f900e63ca36f696cd7ae5999fb4c418d2d62a3dd14ac048c4f

            SHA512

            c0b90fef865a765cfd91b25753fcdf4b8cc31787313ce787aa4e55f3e26a0a68dcf71d165012ee70a682a48911bc5f73f4e7b72c2eabbc5b963a167e13f70f8e

          • C:\Users\Admin\AppData\Local\Temp\dhaqkpwfb.exe
            MD5

            4d8b8e29c29d810de67dac8ff101c5ad

            SHA1

            c03a691f88fa1623fab831b3711369054e50bb17

            SHA256

            7d326ce46f8343f900e63ca36f696cd7ae5999fb4c418d2d62a3dd14ac048c4f

            SHA512

            c0b90fef865a765cfd91b25753fcdf4b8cc31787313ce787aa4e55f3e26a0a68dcf71d165012ee70a682a48911bc5f73f4e7b72c2eabbc5b963a167e13f70f8e

          • C:\Users\Admin\AppData\Local\Temp\tmpB641.tmp.ps1
            MD5

            0097c5fda4656d8639df90d022fa462c

            SHA1

            441ebae47987c4e6acf1af01d79319e970240d2e

            SHA256

            bd1b669933215812c27b0992020aa91c30422c9d32e4a7eefe17811186020b30

            SHA512

            8fee0b6e99946bd146b323eff97fc8d70ba9711eccc692c9e34edffa563d189e0f763a65f02587cf88a9ee9a966d61da98ab695ddf86e0820b3d665e2815f621

          • C:\Users\Admin\AppData\Local\Temp\tmpC5E3.tmp.ps1
            MD5

            044dd4bc1936bfb55444e53ab3b606ae

            SHA1

            00d982bb556e14e6c39fa35fa3c6414054f62a46

            SHA256

            387f54044c7aa3bf8706a2578d0e5bfd524a62aea116dc49e46cc5bdb11cb515

            SHA512

            0c9bcc2dcf5faadc69ad8b08f3ba28f17bf0baf242ddea682d7db40b79c05e3d6f5cd758b9f8ca08f45f3531d1b08c6e03a4d4d6250044a293d51ff7edb5a99f

          • \Users\Admin\AppData\Local\Temp\3B4770~1.DLL
            MD5

            ec867eb16ed355159d44c0658739766d

            SHA1

            c337810cbe2d44cd222dd1b9fb0d3b26714e79cc

            SHA256

            a2e2c09b1e63e387eefed37599dcc6d4ad85d28fded26cf2de36264f8316bf22

            SHA512

            26b0d4c67c1988266bdc0591ff696c2691e4208081aafe1d392c8648ee208346026ab4d6cd00d90bcd9bec055ca7cc9fffee5892e32de6c6a40621aa30428411

          • \Users\Admin\AppData\Local\Temp\3B4770~1.DLL
            MD5

            ec867eb16ed355159d44c0658739766d

            SHA1

            c337810cbe2d44cd222dd1b9fb0d3b26714e79cc

            SHA256

            a2e2c09b1e63e387eefed37599dcc6d4ad85d28fded26cf2de36264f8316bf22

            SHA512

            26b0d4c67c1988266bdc0591ff696c2691e4208081aafe1d392c8648ee208346026ab4d6cd00d90bcd9bec055ca7cc9fffee5892e32de6c6a40621aa30428411

          • \Users\Admin\AppData\Local\Temp\3B4770~1.DLL
            MD5

            ec867eb16ed355159d44c0658739766d

            SHA1

            c337810cbe2d44cd222dd1b9fb0d3b26714e79cc

            SHA256

            a2e2c09b1e63e387eefed37599dcc6d4ad85d28fded26cf2de36264f8316bf22

            SHA512

            26b0d4c67c1988266bdc0591ff696c2691e4208081aafe1d392c8648ee208346026ab4d6cd00d90bcd9bec055ca7cc9fffee5892e32de6c6a40621aa30428411

          • memory/184-10-0x0000000000000000-mapping.dmp
          • memory/796-20-0x0000000000000000-mapping.dmp
          • memory/824-6-0x0000000000000000-mapping.dmp
          • memory/868-31-0x0000000000000000-mapping.dmp
          • memory/868-35-0x0000000004DC0000-0x0000000005418000-memory.dmp
            Filesize

            6.3MB

          • memory/1232-48-0x0000000000000000-mapping.dmp
          • memory/1424-18-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/1424-15-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/1424-16-0x0000000000405DB0-mapping.dmp
          • memory/1812-60-0x0000000008060000-0x0000000008061000-memory.dmp
            Filesize

            4KB

          • memory/1812-49-0x0000000000000000-mapping.dmp
          • memory/1812-51-0x00000000705D0000-0x0000000070CBE000-memory.dmp
            Filesize

            6.9MB

          • memory/1812-57-0x0000000007AD0000-0x0000000007AD1000-memory.dmp
            Filesize

            4KB

          • memory/2460-0-0x0000000000000000-mapping.dmp
          • memory/2476-63-0x0000000000000000-mapping.dmp
          • memory/2500-1-0x0000000000000000-mapping.dmp
          • memory/2540-26-0x0000000002EF0000-0x0000000002EF1000-memory.dmp
            Filesize

            4KB

          • memory/2540-21-0x0000000000000000-mapping.dmp
          • memory/2540-22-0x0000000000000000-mapping.dmp
          • memory/2588-8-0x0000000000000000-mapping.dmp
          • memory/2880-30-0x0000000004E90000-0x00000000054E8000-memory.dmp
            Filesize

            6.3MB

          • memory/2880-27-0x0000000000000000-mapping.dmp
          • memory/2992-3-0x0000000000000000-mapping.dmp
          • memory/3220-42-0x0000000008280000-0x0000000008281000-memory.dmp
            Filesize

            4KB

          • memory/3220-45-0x0000000008A20000-0x0000000008A21000-memory.dmp
            Filesize

            4KB

          • memory/3220-46-0x0000000008A70000-0x0000000008A71000-memory.dmp
            Filesize

            4KB

          • memory/3220-37-0x0000000070A50000-0x000000007113E000-memory.dmp
            Filesize

            6.9MB

          • memory/3220-36-0x0000000000000000-mapping.dmp
          • memory/3220-44-0x00000000086E0000-0x00000000086E1000-memory.dmp
            Filesize

            4KB

          • memory/3220-43-0x00000000082F0000-0x00000000082F1000-memory.dmp
            Filesize

            4KB

          • memory/3220-38-0x0000000007230000-0x0000000007231000-memory.dmp
            Filesize

            4KB

          • memory/3220-41-0x0000000008210000-0x0000000008211000-memory.dmp
            Filesize

            4KB

          • memory/3220-40-0x0000000007910000-0x0000000007911000-memory.dmp
            Filesize

            4KB

          • memory/3220-39-0x0000000007990000-0x0000000007991000-memory.dmp
            Filesize

            4KB

          • memory/3480-12-0x0000000000000000-mapping.dmp
          • memory/3700-4-0x0000000000000000-mapping.dmp