Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-01-2021 06:14

General

  • Target

    file.exe

  • Size

    3.8MB

  • MD5

    2e14c53a16fd3117aa1e940c69679c23

  • SHA1

    7768c676e75565d2c09505bab2f765bc583c1170

  • SHA256

    c52ace76d94d2c7687a8c4bd529f86c343c05cc388df75432736b1c384f8677e

  • SHA512

    a4477f135037cf94d18e718d16746a875b85ad4fa3bdaa397f2d00198c14b4ff945cc9a3435eecb5408b2c575ccb207670c45333121d0dd935158e9ed2ade263

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:1080

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1020-17-0x000007FEF6930000-0x000007FEF6BAA000-memory.dmp
    Filesize

    2.5MB

  • memory/1080-10-0x0000000004820000-0x0000000004886000-memory.dmp
    Filesize

    408KB

  • memory/1080-12-0x0000000002420000-0x000000000246F000-memory.dmp
    Filesize

    316KB

  • memory/1080-6-0x0000000002230000-0x00000000022CD000-memory.dmp
    Filesize

    628KB

  • memory/1080-7-0x0000000004580000-0x0000000004609000-memory.dmp
    Filesize

    548KB

  • memory/1080-8-0x0000000004610000-0x000000000468E000-memory.dmp
    Filesize

    504KB

  • memory/1080-2-0x0000000074CF0000-0x00000000753DE000-memory.dmp
    Filesize

    6.9MB

  • memory/1080-11-0x0000000002310000-0x000000000236A000-memory.dmp
    Filesize

    360KB

  • memory/1080-5-0x0000000000A30000-0x0000000000AD9000-memory.dmp
    Filesize

    676KB

  • memory/1080-13-0x0000000004900000-0x0000000004944000-memory.dmp
    Filesize

    272KB

  • memory/1080-15-0x00000000023B0000-0x00000000023DE000-memory.dmp
    Filesize

    184KB

  • memory/1080-14-0x0000000006000000-0x0000000006039000-memory.dmp
    Filesize

    228KB

  • memory/1080-9-0x00000000047A0000-0x0000000004812000-memory.dmp
    Filesize

    456KB

  • memory/1080-16-0x0000000002380000-0x0000000002385000-memory.dmp
    Filesize

    20KB

  • memory/1080-3-0x00000000003C0000-0x00000000003C1000-memory.dmp
    Filesize

    4KB