Resubmissions

15-12-2021 16:03

211215-thfltaaaa4 7

24-11-2020 02:27

201124-axvpvjcp7e 8

Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    24-11-2020 02:27

General

  • Target

    RubyMine-2020.2.3.exe

  • Size

    307.9MB

  • MD5

    7ddd8ecd1cb209bcc6b599126aad8e37

  • SHA1

    4cf04b6e45d5dafe68aeb90ba34290a6e2ee2504

  • SHA256

    28746a13fb1554be4343381135a72e8fcc8d978bdbb3d7c4b434f68ce20a418c

  • SHA512

    d1356db63a342ffc2bd1ee89070b27870995af67fafa3d828a1d00dbc85ab3f89c268e1920de14f18a3c7516763192926b4abe4ba9599e75ac08ff4f3e1e9eda

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 15 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Program Files directory 3516 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 28 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:532 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1708
  • C:\Users\Admin\AppData\Local\Temp\RubyMine-2020.2.3.exe
    "C:\Users\Admin\AppData\Local\Temp\RubyMine-2020.2.3.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Modifies registry class
    PID:1956
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\J6N6YHLY.txt
    MD5

    ef622a57ebb8979d53b18142630e3f8a

    SHA1

    0d2dff0afc78a6d4bb1a31433fa1aceaac69a440

    SHA256

    0f5e5828c875c9cd3fece16df7fda3472067dec8ee428c3426a43467c14c3030

    SHA512

    72307c4b3bad385f0de12494c79e2bc40c067fd1fb9aa95510f48a32709ec2ce3d7f3ceffe1193331082a55f8e95f913d1f18d80bdc76935d8f36fa6d7cca818

  • \Program Files\JetBrains\RubyMine 2020.2.3\bin\rubymine64.exe
    MD5

    8de2cfe6f9abbfba5a13a1435e49149d

    SHA1

    8b9c43186028c7be5dbbde635c0ccd78b7c4ae56

    SHA256

    17ba5701f91597dc6f6784332ff37e74f30c7d88c080a0c94f5ad32c924647e4

    SHA512

    7eacc632770dc80cb727c7805766774ef629aaa914e829f312bb1887fca84d274bb83901fc07a1465925a1d6d522fcfa5fc1b49440f7c2c4e557f7ddc274eebb

  • \Program Files\JetBrains\RubyMine 2020.2.3\bin\rubymine64.exe
    MD5

    8de2cfe6f9abbfba5a13a1435e49149d

    SHA1

    8b9c43186028c7be5dbbde635c0ccd78b7c4ae56

    SHA256

    17ba5701f91597dc6f6784332ff37e74f30c7d88c080a0c94f5ad32c924647e4

    SHA512

    7eacc632770dc80cb727c7805766774ef629aaa914e829f312bb1887fca84d274bb83901fc07a1465925a1d6d522fcfa5fc1b49440f7c2c4e557f7ddc274eebb

  • \Program Files\JetBrains\RubyMine 2020.2.3\bin\rubymine64.exe
    MD5

    8de2cfe6f9abbfba5a13a1435e49149d

    SHA1

    8b9c43186028c7be5dbbde635c0ccd78b7c4ae56

    SHA256

    17ba5701f91597dc6f6784332ff37e74f30c7d88c080a0c94f5ad32c924647e4

    SHA512

    7eacc632770dc80cb727c7805766774ef629aaa914e829f312bb1887fca84d274bb83901fc07a1465925a1d6d522fcfa5fc1b49440f7c2c4e557f7ddc274eebb

  • \Program Files\JetBrains\RubyMine 2020.2.3\bin\rubymine64.exe
    MD5

    8de2cfe6f9abbfba5a13a1435e49149d

    SHA1

    8b9c43186028c7be5dbbde635c0ccd78b7c4ae56

    SHA256

    17ba5701f91597dc6f6784332ff37e74f30c7d88c080a0c94f5ad32c924647e4

    SHA512

    7eacc632770dc80cb727c7805766774ef629aaa914e829f312bb1887fca84d274bb83901fc07a1465925a1d6d522fcfa5fc1b49440f7c2c4e557f7ddc274eebb

  • \Program Files\JetBrains\RubyMine 2020.2.3\bin\rubymine64.exe
    MD5

    8de2cfe6f9abbfba5a13a1435e49149d

    SHA1

    8b9c43186028c7be5dbbde635c0ccd78b7c4ae56

    SHA256

    17ba5701f91597dc6f6784332ff37e74f30c7d88c080a0c94f5ad32c924647e4

    SHA512

    7eacc632770dc80cb727c7805766774ef629aaa914e829f312bb1887fca84d274bb83901fc07a1465925a1d6d522fcfa5fc1b49440f7c2c4e557f7ddc274eebb

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\ExecDos.dll
    MD5

    774e3b33d151413dc826bf2421cd51e8

    SHA1

    ab2928dcf6fa54bb9eb16e5f64bfcffaaeee90fa

    SHA256

    91d5481f576382164703e4ac244052265769377838ac30233ad79c983ed9d454

    SHA512

    3cf955b13e81e4b6edb292df751ce7f64b0cf30979f57b1609f002859b4e68adc046b6674f76f7b7ce7144382316c344c11fed02d638e62fcc8464c32795a365

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\InstallOptions.dll
    MD5

    720304c57dcfa17751ed455b3bb9c10a

    SHA1

    59a1c3a746de10b8875229ff29006f1fd36b1e41

    SHA256

    6486029d3939231bd9f10457fd9a5ab2e44f30315af443197a3347df4e18c4e9

    SHA512

    c64c161290f5c21d642ecf16cc6ad3ee4a31bf5bab41c65c74907a5c158eaca429ef99cd8d2b55dc2ecb8478bb0b85c1576402389a07568f36c871b2772ead04

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\InstallOptions.dll
    MD5

    720304c57dcfa17751ed455b3bb9c10a

    SHA1

    59a1c3a746de10b8875229ff29006f1fd36b1e41

    SHA256

    6486029d3939231bd9f10457fd9a5ab2e44f30315af443197a3347df4e18c4e9

    SHA512

    c64c161290f5c21d642ecf16cc6ad3ee4a31bf5bab41c65c74907a5c158eaca429ef99cd8d2b55dc2ecb8478bb0b85c1576402389a07568f36c871b2772ead04

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\InstallOptions.dll
    MD5

    720304c57dcfa17751ed455b3bb9c10a

    SHA1

    59a1c3a746de10b8875229ff29006f1fd36b1e41

    SHA256

    6486029d3939231bd9f10457fd9a5ab2e44f30315af443197a3347df4e18c4e9

    SHA512

    c64c161290f5c21d642ecf16cc6ad3ee4a31bf5bab41c65c74907a5c158eaca429ef99cd8d2b55dc2ecb8478bb0b85c1576402389a07568f36c871b2772ead04

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\InstallOptions.dll
    MD5

    720304c57dcfa17751ed455b3bb9c10a

    SHA1

    59a1c3a746de10b8875229ff29006f1fd36b1e41

    SHA256

    6486029d3939231bd9f10457fd9a5ab2e44f30315af443197a3347df4e18c4e9

    SHA512

    c64c161290f5c21d642ecf16cc6ad3ee4a31bf5bab41c65c74907a5c158eaca429ef99cd8d2b55dc2ecb8478bb0b85c1576402389a07568f36c871b2772ead04

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\ShellLink.dll
    MD5

    d62d3e349689811f838dd10fb216eba1

    SHA1

    edcafd517860cb6b4bd299e20b17ad74a6fa2a5d

    SHA256

    5d103419245e2a5f124a96cace25d6836b2398edc0aa3919829b0fd6ad8b5d6a

    SHA512

    fc7d5826cb9f85068ea702f007920bf7ae63758d13c48761e83cc9e8ac06b231f40e17a9f3340d60d874ad2cf6e0991eb98a52cf893ab785489e0cdbbf294f88

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\StartMenu.dll
    MD5

    8a8cf094137e9c56386d5cf84f936fd0

    SHA1

    60a0cc212e5a1ce303a028f8ddafe0989c202b8d

    SHA256

    2053d459f5ae1213eaba8ecae74671144c1af140660034b5af23c97818e2c789

    SHA512

    d938cdb8aabeaf22ce573c4817eed2e8c235c5b4d9d3fb7139db6e8d9ebc73957425cfaa0ec119cc506bcf9c3ecc6b6393fff9278b8d873564148557df5cd9ec

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\System.dll
    MD5

    17ed1c86bd67e78ade4712be48a7d2bd

    SHA1

    1cc9fe86d6d6030b4dae45ecddce5907991c01a0

    SHA256

    bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

    SHA512

    0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\UAC.dll
    MD5

    adb29e6b186daa765dc750128649b63d

    SHA1

    160cbdc4cb0ac2c142d361df138c537aa7e708c9

    SHA256

    2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

    SHA512

    b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

  • \Users\Admin\AppData\Local\Temp\nsxB58A.tmp\nsDialogs.dll
    MD5

    42b064366f780c1f298fa3cb3aeae260

    SHA1

    5b0349db73c43f35227b252b9aa6555f5ede9015

    SHA256

    c13104552b8b553159f50f6e2ca45114493397a6fa4bf2cbb960c4a2bbd349ab

    SHA512

    50d8f4f7a3ff45d5854741e7c4153fa13ee1093bafbe9c2adc60712ed2fb505c9688dd420d75aaea1b696da46b6beccc232e41388bc2a16b1f9eea1832df1cd7

  • memory/1068-19-0x0000000001DA0000-0x0000000001DA1000-memory.dmp
    Filesize

    4KB

  • memory/1068-20-0x0000000001DA0000-0x0000000001DA1000-memory.dmp
    Filesize

    4KB

  • memory/1708-1-0x0000000000000000-mapping.dmp
  • memory/1956-18-0x0000000003B30000-0x0000000003C31000-memory.dmp
    Filesize

    1.0MB

  • memory/1956-8-0x0000000003A30000-0x0000000003A31000-memory.dmp
    Filesize

    4KB

  • memory/1984-0-0x000007FEF7040000-0x000007FEF72BA000-memory.dmp
    Filesize

    2.5MB