Analysis
-
max time kernel
138s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 14:09
Static task
static1
Behavioral task
behavioral1
Sample
3e7fb15093287d6e06313027be35bf6d.exe
Resource
win7v20201028
General
-
Target
3e7fb15093287d6e06313027be35bf6d.exe
-
Size
328KB
-
MD5
3e7fb15093287d6e06313027be35bf6d
-
SHA1
4cb59e23f295f7d58f47aae7dccff55d17269765
-
SHA256
e3d0de327842dd2de91dea4ac6f9a710b1e97f57421200eae2415663651d60b9
-
SHA512
bd08fd6d1d594ebbb9c1f1977e0a36d646d9f9de79e2bd43d35530ced07a3998eef8013632870c44b60d68dafa3d8d6a9c540dfb31970be1896fd5105d9d4afe
Malware Config
Extracted
systembc
dl-link.network:4153
dl-link.club:4153
Signatures
-
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3084-3-0x00000000001C0000-0x00000000001F6000-memory.dmp family_taurus_stealer behavioral2/memory/3084-4-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
jggjkIhB.exejggjkIhB.exeuxwq.exeuxwq.exepid process 4064 jggjkIhB.exe 3552 jggjkIhB.exe 3124 uxwq.exe 2064 uxwq.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exe upx C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exe upx C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exe upx C:\Windows\Temp\uxwq.exe upx C:\Windows\TEMP\uxwq.exe upx C:\Windows\Temp\uxwq.exe upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 5 IoCs
Processes:
jggjkIhB.exejggjkIhB.exeuxwq.exedescription ioc process File created C:\Windows\Tasks\wow64.job jggjkIhB.exe File opened for modification C:\Windows\Tasks\wow64.job jggjkIhB.exe File created C:\Windows\Tasks\cnilnenpgwgvgpgvgof.job jggjkIhB.exe File created C:\Windows\Tasks\wow64.job uxwq.exe File opened for modification C:\Windows\Tasks\wow64.job uxwq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3e7fb15093287d6e06313027be35bf6d.exedescription pid process target process PID 3084 wrote to memory of 4064 3084 3e7fb15093287d6e06313027be35bf6d.exe jggjkIhB.exe PID 3084 wrote to memory of 4064 3084 3e7fb15093287d6e06313027be35bf6d.exe jggjkIhB.exe PID 3084 wrote to memory of 4064 3084 3e7fb15093287d6e06313027be35bf6d.exe jggjkIhB.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e7fb15093287d6e06313027be35bf6d.exe"C:\Users\Admin\AppData\Local\Temp\3e7fb15093287d6e06313027be35bf6d.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exe"C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exeC:\Users\Admin\AppData\Local\Temp\jggjkIhB.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\TEMP\uxwq.exeC:\Windows\TEMP\uxwq.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\TEMP\uxwq.exeC:\Windows\TEMP\uxwq.exe start1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exeMD5
8062878d5d1560c72c4043058d81261e
SHA15846e13d09a03fcd87a354d2ac309782bfe6cbcc
SHA2564c04dce0d2aa3fbecd1951f680bff98c2c8c11af54103e6e0aa0bb358a5c0824
SHA512ac48a9d5941ac0577cfb7746087a2d8753ff00b7287b12da66c1ad3b3b4a57b62c8f5f1a17f27bff7cc513a5b69fd7ae13ac16fbc9e9cc48e6c15e7aedfbaf74
-
C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exeMD5
8062878d5d1560c72c4043058d81261e
SHA15846e13d09a03fcd87a354d2ac309782bfe6cbcc
SHA2564c04dce0d2aa3fbecd1951f680bff98c2c8c11af54103e6e0aa0bb358a5c0824
SHA512ac48a9d5941ac0577cfb7746087a2d8753ff00b7287b12da66c1ad3b3b4a57b62c8f5f1a17f27bff7cc513a5b69fd7ae13ac16fbc9e9cc48e6c15e7aedfbaf74
-
C:\Users\Admin\AppData\Local\Temp\jggjkIhB.exeMD5
8062878d5d1560c72c4043058d81261e
SHA15846e13d09a03fcd87a354d2ac309782bfe6cbcc
SHA2564c04dce0d2aa3fbecd1951f680bff98c2c8c11af54103e6e0aa0bb358a5c0824
SHA512ac48a9d5941ac0577cfb7746087a2d8753ff00b7287b12da66c1ad3b3b4a57b62c8f5f1a17f27bff7cc513a5b69fd7ae13ac16fbc9e9cc48e6c15e7aedfbaf74
-
C:\Windows\TEMP\uxwq.exeMD5
8062878d5d1560c72c4043058d81261e
SHA15846e13d09a03fcd87a354d2ac309782bfe6cbcc
SHA2564c04dce0d2aa3fbecd1951f680bff98c2c8c11af54103e6e0aa0bb358a5c0824
SHA512ac48a9d5941ac0577cfb7746087a2d8753ff00b7287b12da66c1ad3b3b4a57b62c8f5f1a17f27bff7cc513a5b69fd7ae13ac16fbc9e9cc48e6c15e7aedfbaf74
-
C:\Windows\Tasks\wow64.jobMD5
9757a43721ee9e0cd64f0b59d863c3ea
SHA1a34d28f6429cb437ec9b6664d9d7a2ae2d9f0fc4
SHA2569751352b2b152ab3b4c81ff7c6cec7aff39e7f20289d0809c4df0aee213cf6ed
SHA512aadcfc3a4b4d17974f21d3fb1e0c9673a62f467e0d73ddb37b795a736834252aa622bae5120edbc0a2891395f55e7e91f2c50782ad65c0034f2d08416701f820
-
C:\Windows\Temp\uxwq.exeMD5
8062878d5d1560c72c4043058d81261e
SHA15846e13d09a03fcd87a354d2ac309782bfe6cbcc
SHA2564c04dce0d2aa3fbecd1951f680bff98c2c8c11af54103e6e0aa0bb358a5c0824
SHA512ac48a9d5941ac0577cfb7746087a2d8753ff00b7287b12da66c1ad3b3b4a57b62c8f5f1a17f27bff7cc513a5b69fd7ae13ac16fbc9e9cc48e6c15e7aedfbaf74
-
C:\Windows\Temp\uxwq.exeMD5
8062878d5d1560c72c4043058d81261e
SHA15846e13d09a03fcd87a354d2ac309782bfe6cbcc
SHA2564c04dce0d2aa3fbecd1951f680bff98c2c8c11af54103e6e0aa0bb358a5c0824
SHA512ac48a9d5941ac0577cfb7746087a2d8753ff00b7287b12da66c1ad3b3b4a57b62c8f5f1a17f27bff7cc513a5b69fd7ae13ac16fbc9e9cc48e6c15e7aedfbaf74
-
memory/2064-21-0x00000000049B0000-0x00000000049B1000-memory.dmpFilesize
4KB
-
memory/3084-2-0x0000000004A40000-0x0000000004A41000-memory.dmpFilesize
4KB
-
memory/3084-4-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/3084-3-0x00000000001C0000-0x00000000001F6000-memory.dmpFilesize
216KB
-
memory/3124-17-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/3552-12-0x0000000004AC0000-0x0000000004AC1000-memory.dmpFilesize
4KB
-
memory/4064-5-0x0000000000000000-mapping.dmp
-
memory/4064-9-0x0000000000030000-0x0000000000035000-memory.dmpFilesize
20KB
-
memory/4064-10-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4064-8-0x00000000049E0000-0x00000000049E1000-memory.dmpFilesize
4KB