Overview
overview
10Static
static
80032588b8d...091.js
windows7_x64
10032588b8d...091.js
windows10_x64
109002c686e...2b.exe
windows7_x64
1009002c686e...2b.exe
windows10_x64
100b1551c0be...16.exe
windows7_x64
10b1551c0be...16.exe
windows10_x64
11048caa70a...29.exe
windows7_x64
101048caa70a...29.exe
windows10_x64
101c3170b776...b0.exe
windows7_x64
31c3170b776...b0.exe
windows10_x64
3240387329d...62.exe
windows7_x64
1240387329d...62.exe
windows10_x64
12573b35645...9a.exe
windows7_x64
102573b35645...9a.exe
windows10_x64
102df6c36b47...51.exe
windows7_x64
72df6c36b47...51.exe
windows10_x64
72df6c36b47...1).exe
windows7_x64
72df6c36b47...1).exe
windows10_x64
72e4319ff62...8b.dll
windows7_x64
12e4319ff62...8b.dll
windows10_x64
32fba2aba4b...07.exe
windows7_x64
12fba2aba4b...07.exe
windows10_x64
13ed5d687a4...bd.exe
windows7_x64
33ed5d687a4...bd.exe
windows10_x64
34fc17a5cf8...d5.exe
windows7_x64
64fc17a5cf8...d5.exe
windows10_x64
65942a02bc0...d3.dll
windows7_x64
105942a02bc0...d3.dll
windows10_x64
106e7785213d...3d.exe
windows7_x64
86e7785213d...3d.exe
windows10_x64
883c64ed85d...a0.exe
windows7_x64
1083c64ed85d...a0.exe
windows10_x64
10Analysis
-
max time kernel
13s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15/03/2021, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
0032588b8d93a807cf0f48a806ccf125677503a6fabe4105a6dc69e81ace6091.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0032588b8d93a807cf0f48a806ccf125677503a6fabe4105a6dc69e81ace6091.js
Resource
win10v20201028
Behavioral task
behavioral3
Sample
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
1048caa70a44f59a621e209cc10308256e7495a427245260469812ca1b710629.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
1048caa70a44f59a621e209cc10308256e7495a427245260469812ca1b710629.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
1c3170b776327a73e95e554258be94a70d6861b37242fe48a5126d06e33de1b0.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
1c3170b776327a73e95e554258be94a70d6861b37242fe48a5126d06e33de1b0.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
2573b356452dd5ee24c10537fa4848d882fa40a2a8fa5a181624ba460e1f769a.exe
Resource
win7v20201028
Behavioral task
behavioral14
Sample
2573b356452dd5ee24c10537fa4848d882fa40a2a8fa5a181624ba460e1f769a.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951.exe
Resource
win7v20201028
Behavioral task
behavioral16
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951(1).exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951(1).exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
2e4319ff62c03a539b2b2f71768a0cfc0adcaedbcca69dbf235081fe2816248b.dll
Resource
win7v20201028
Behavioral task
behavioral20
Sample
2e4319ff62c03a539b2b2f71768a0cfc0adcaedbcca69dbf235081fe2816248b.dll
Resource
win10v20201028
Behavioral task
behavioral21
Sample
2fba2aba4b6d7ff3a8b262399a30c7f45ff15cfab932c25fc61477278171a107.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
2fba2aba4b6d7ff3a8b262399a30c7f45ff15cfab932c25fc61477278171a107.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
3ed5d687a46e865424395d3dd455f69c82ac0b22fa24f361db6e87e7aa5019bd.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
3ed5d687a46e865424395d3dd455f69c82ac0b22fa24f361db6e87e7aa5019bd.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
4fc17a5cf81946e26f1846986557801c0a802e56255c7d112cc3edc0d70255d5.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
4fc17a5cf81946e26f1846986557801c0a802e56255c7d112cc3edc0d70255d5.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3.dll
Resource
win7v20201028
Behavioral task
behavioral28
Sample
5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3.dll
Resource
win10v20201028
Behavioral task
behavioral29
Sample
6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
6e7785213d6af20f376a909c1ecb6c9bddec70049764f08e5054a52997241e3d.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
83c64ed85d0245b22a7fb1e1f529ccd4db58b49fc6cf656c8d56712fa0b9fea0.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
83c64ed85d0245b22a7fb1e1f529ccd4db58b49fc6cf656c8d56712fa0b9fea0.exe
Resource
win10v20201028
General
-
Target
5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3.dll
-
Size
68KB
-
MD5
0e9a211f76500fcb3f47f4ea3c94b1c5
-
SHA1
f92f1d121642844b1dab7eee204aa83a5ee0a1e2
-
SHA256
5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3
-
SHA512
15ccb1a92f48bcbd5b9043b9dc275170030a73ad5ffc9e55550a32cf3f2ac3379dc65b95851ec9c5bd643093b28f37dbb41fe2319af374a725e83a7a1870d76f
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 1192 rundll32.exe Token: SeTcbPrivilege 1192 rundll32.exe Token: SeChangeNotifyPrivilege 1192 rundll32.exe Token: SeCreateTokenPrivilege 1192 rundll32.exe Token: SeBackupPrivilege 1192 rundll32.exe Token: SeRestorePrivilege 1192 rundll32.exe Token: SeIncreaseQuotaPrivilege 1192 rundll32.exe Token: SeAssignPrimaryTokenPrivilege 1192 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1192 1056 rundll32.exe 70 PID 1056 wrote to memory of 1192 1056 rundll32.exe 70 PID 1056 wrote to memory of 1192 1056 rundll32.exe 70
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5942a02bc0a0e32875bc71e9a678b065d5f0e144938467a3590ba884884153d3.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1192
-