Analysis

  • max time kernel
    65s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    28-02-2021 07:18

General

  • Target

    b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89.exe

  • Size

    605KB

  • MD5

    1578dff0667515e1f9e20fd9667b5793

  • SHA1

    6c18fd0b383162cb9030e4b18a27ecbacd8c34d3

  • SHA256

    b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89

  • SHA512

    0d261eb8c81bef9df5bc0812c1b9e77d8f0728c891bc9e9ffcfd8df89733cff0e2b581891a6e6da05d068d26353ff0992056a2c0198cf484d3050e5e6e534004

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 6 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89.exe
    "C:\Users\Admin\AppData\Local\Temp\b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3840
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89" /sc ONLOGON /tr "'C:\PerfLogs\b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3308
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\ProgramData\Mozilla\updates\csrss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3152
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\Offline\csrss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3532
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Public\Downloads\audiodg.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3488
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\dwm.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4048
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\dllhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4340
    • C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\dllhost.exe
      "C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\dllhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4384
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4384 -s 2548
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1588

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\dllhost.exe
    MD5

    1578dff0667515e1f9e20fd9667b5793

    SHA1

    6c18fd0b383162cb9030e4b18a27ecbacd8c34d3

    SHA256

    b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89

    SHA512

    0d261eb8c81bef9df5bc0812c1b9e77d8f0728c891bc9e9ffcfd8df89733cff0e2b581891a6e6da05d068d26353ff0992056a2c0198cf484d3050e5e6e534004

  • C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\dllhost.exe
    MD5

    1578dff0667515e1f9e20fd9667b5793

    SHA1

    6c18fd0b383162cb9030e4b18a27ecbacd8c34d3

    SHA256

    b25d1a51f01c5d9c4f2091c5dcdcc77bca91d4fbca3c30f1c6ca64d3f7c8dd89

    SHA512

    0d261eb8c81bef9df5bc0812c1b9e77d8f0728c891bc9e9ffcfd8df89733cff0e2b581891a6e6da05d068d26353ff0992056a2c0198cf484d3050e5e6e534004

  • memory/1588-37-0x0000020F91A90000-0x0000020F91A91000-memory.dmp
    Filesize

    4KB

  • memory/1588-36-0x0000020F91A90000-0x0000020F91A91000-memory.dmp
    Filesize

    4KB

  • memory/3152-11-0x0000000000000000-mapping.dmp
  • memory/3308-10-0x0000000000000000-mapping.dmp
  • memory/3488-13-0x0000000000000000-mapping.dmp
  • memory/3532-12-0x0000000000000000-mapping.dmp
  • memory/3840-9-0x0000000000000000-mapping.dmp
  • memory/4048-14-0x0000000000000000-mapping.dmp
  • memory/4340-15-0x0000000000000000-mapping.dmp
  • memory/4384-19-0x00007FFBE03C0000-0x00007FFBE0DAC000-memory.dmp
    Filesize

    9.9MB

  • memory/4384-30-0x000001D2C5507000-0x000001D2C5509000-memory.dmp
    Filesize

    8KB

  • memory/4384-35-0x000001D2C6A9C000-0x000001D2C6AA1000-memory.dmp
    Filesize

    20KB

  • memory/4384-34-0x000001D2C6A97000-0x000001D2C6A9C000-memory.dmp
    Filesize

    20KB

  • memory/4384-22-0x000001D2C5500000-0x000001D2C5502000-memory.dmp
    Filesize

    8KB

  • memory/4384-26-0x000001D2AB570000-0x000001D2AB571000-memory.dmp
    Filesize

    4KB

  • memory/4384-28-0x000001D2C5502000-0x000001D2C5504000-memory.dmp
    Filesize

    8KB

  • memory/4384-27-0x000001D2C5504000-0x000001D2C5505000-memory.dmp
    Filesize

    4KB

  • memory/4384-29-0x000001D2C5505000-0x000001D2C5507000-memory.dmp
    Filesize

    8KB

  • memory/4384-16-0x0000000000000000-mapping.dmp
  • memory/4384-31-0x000001D2C5509000-0x000001D2C550F000-memory.dmp
    Filesize

    24KB

  • memory/4384-32-0x000001D2C6A90000-0x000001D2C6A94000-memory.dmp
    Filesize

    16KB

  • memory/4384-33-0x000001D2C6A94000-0x000001D2C6A97000-memory.dmp
    Filesize

    12KB

  • memory/4652-2-0x00007FFBE03C0000-0x00007FFBE0DAC000-memory.dmp
    Filesize

    9.9MB

  • memory/4652-6-0x000001FD2AAA0000-0x000001FD2AAA1000-memory.dmp
    Filesize

    4KB

  • memory/4652-5-0x000001FD44C30000-0x000001FD44C32000-memory.dmp
    Filesize

    8KB

  • memory/4652-3-0x000001FD2A670000-0x000001FD2A671000-memory.dmp
    Filesize

    4KB