Analysis

  • max time kernel
    37s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-04-2021 15:57

General

  • Target

    SecuriteInfo.com.Trojan.Coins.Win32.5986.15363.1750.exe

  • Size

    1.1MB

  • MD5

    845615bf78874fa55758ce6fa4b36084

  • SHA1

    57871e28d04d19bb2f99cfacdc844073418c0d7c

  • SHA256

    ec7db23abe0578993c032c1c962db58d72bc1cdcb8401d33e60e92f784defb75

  • SHA512

    7d88605095090bb6aebbd27e4ff76be4de8a85be3a33294938c2faa3151bc063b8add8f05f277642e6f8c9395a136757439943912ba704121e0fbb095462ff5d

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Coins.Win32.5986.15363.1750.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Coins.Win32.5986.15363.1750.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: AddClipboardFormatListener
        PID:876
    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Windows\SysWOW64\dllhost.exe
        "C:\Windows\System32\dllhost.exe"
        3⤵
          PID:1648
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Ecco.mui
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:324
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\System32\cmd.exe
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:748
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^SWvvNsCFdcAaTIdceXyZtHLnsGRMChPCNyOplWTraOiksPcHhKILZSslkYtuAQerGXFNUikurwHdmmiCkpnREtCUNDYjSMCCLtFzlHMumBHYkw$" Profondata.mui
              5⤵
                PID:1572
              • C:\Users\Admin\AppData\Roaming\FYmkuAFJptiVL\Osato.exe.com
                Osato.exe.com K
                5⤵
                • Executes dropped EXE
                PID:828
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 30
                5⤵
                • Runs ping.exe
                PID:520

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        4402cf08ffc7af71fc2fe28070fbe2e5

        SHA1

        a45a015f2a8f8206ba349350c07202edfb62de24

        SHA256

        4132c4bb6379db32fb14aab90717c9b9e8cada860656a4cda2c33f73e81f6bc0

        SHA512

        b20c651544765b8a15beaf6ff07a7814b2a4f484e13d9d7a8618b50a9428e1635aa4a018bb243145bdbf667808dfc6ce37e0fa2bb1cebdf26ac90e5770f3470d

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        4402cf08ffc7af71fc2fe28070fbe2e5

        SHA1

        a45a015f2a8f8206ba349350c07202edfb62de24

        SHA256

        4132c4bb6379db32fb14aab90717c9b9e8cada860656a4cda2c33f73e81f6bc0

        SHA512

        b20c651544765b8a15beaf6ff07a7814b2a4f484e13d9d7a8618b50a9428e1635aa4a018bb243145bdbf667808dfc6ce37e0fa2bb1cebdf26ac90e5770f3470d

      • C:\Users\Admin\AppData\Roaming\FYmkuAFJptiVL\Ecco.mui
        MD5

        a2c055692d535eeb0d41990f533ac147

        SHA1

        a9c5c92079e453ccad3c50657c9ce94584c1af2f

        SHA256

        0f7a7b1b05eeca930d60918f66bbe5a1fa83343050b9a4e8d2b55f44a4a6a3ae

        SHA512

        97d8e6ade9c8ebfcc102b37ca14324ac299256e1d09e09a55e5e764adaaf618e621aa487eca042da954cba7ba36e1636baa3fc4e5f0135a28020dead939d8c6c

      • C:\Users\Admin\AppData\Roaming\FYmkuAFJptiVL\Osato.exe.com
        MD5

        78ba0653a340bac5ff152b21a83626cc

        SHA1

        b12da9cb5d024555405040e65ad89d16ae749502

        SHA256

        05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

        SHA512

        efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

      • C:\Users\Admin\AppData\Roaming\FYmkuAFJptiVL\Profondata.mui
        MD5

        768cb44a2b75023b582663503484dd71

        SHA1

        f7188b5b4313d5d4fa8191f66ac2cc5e13ae4553

        SHA256

        0c85dba919ca891dafc7c5d8519bcf43ef4a56ed55159b4bb79c93da47ae3f1c

        SHA512

        f25efae17b6e7f0eef89d38c73c67413912d077db97fbb1acf372bfa84c8c84a41340db7f33e7667d5fbfbea97d56ec3b27f158132291267aea0304833267707

      • C:\Users\Admin\AppData\Roaming\FYmkuAFJptiVL\Rete.mui
        MD5

        3ab81fd892c2b701a1d284c85718209b

        SHA1

        10219f3f01c527012581f26b2c980050eb04e2a5

        SHA256

        13b302300f48ee0e50fdddf343676e7717e0bc434225d2d4c39f315c7fe666e4

        SHA512

        eba34b5712b1cc902bf8d75cf3a16a966e05782258a3dc0ecd4e783fb1c990fbc9e651d305ab12a6557bb8d86756216901849cd226df67813147e5fda7f2447b

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        4402cf08ffc7af71fc2fe28070fbe2e5

        SHA1

        a45a015f2a8f8206ba349350c07202edfb62de24

        SHA256

        4132c4bb6379db32fb14aab90717c9b9e8cada860656a4cda2c33f73e81f6bc0

        SHA512

        b20c651544765b8a15beaf6ff07a7814b2a4f484e13d9d7a8618b50a9428e1635aa4a018bb243145bdbf667808dfc6ce37e0fa2bb1cebdf26ac90e5770f3470d

      • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        4402cf08ffc7af71fc2fe28070fbe2e5

        SHA1

        a45a015f2a8f8206ba349350c07202edfb62de24

        SHA256

        4132c4bb6379db32fb14aab90717c9b9e8cada860656a4cda2c33f73e81f6bc0

        SHA512

        b20c651544765b8a15beaf6ff07a7814b2a4f484e13d9d7a8618b50a9428e1635aa4a018bb243145bdbf667808dfc6ce37e0fa2bb1cebdf26ac90e5770f3470d

      • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        4402cf08ffc7af71fc2fe28070fbe2e5

        SHA1

        a45a015f2a8f8206ba349350c07202edfb62de24

        SHA256

        4132c4bb6379db32fb14aab90717c9b9e8cada860656a4cda2c33f73e81f6bc0

        SHA512

        b20c651544765b8a15beaf6ff07a7814b2a4f484e13d9d7a8618b50a9428e1635aa4a018bb243145bdbf667808dfc6ce37e0fa2bb1cebdf26ac90e5770f3470d

      • \Users\Admin\AppData\Local\Temp\nsc1343.tmp\UAC.dll
        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • \Users\Admin\AppData\Roaming\FYmkuAFJptiVL\Osato.exe.com
        MD5

        78ba0653a340bac5ff152b21a83626cc

        SHA1

        b12da9cb5d024555405040e65ad89d16ae749502

        SHA256

        05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

        SHA512

        efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        19ca8e40307dc5017609b4c8084e629a

        SHA1

        659992217d69898aa2bbbc989227e406d335282f

        SHA256

        57e2edeb4273c17bd3cc4b86bb9c20d6b9eaecb3e0775e6a7ff9d72bec1c38a0

        SHA512

        8a3a22e5267041222fe9e69f2ba968545455d2f1b7ff31e2a20b6c7de7720ffec65799b519919012b22300dcd82b782f895d2714bcf10756a2b5dc36188309c2

      • memory/324-79-0x0000000000000000-mapping.dmp
      • memory/520-91-0x0000000000000000-mapping.dmp
      • memory/748-82-0x0000000000000000-mapping.dmp
      • memory/828-89-0x0000000000000000-mapping.dmp
      • memory/876-99-0x0000000000000000-mapping.dmp
      • memory/876-107-0x0000000000400000-0x0000000002BA1000-memory.dmp
        Filesize

        39.6MB

      • memory/1572-84-0x0000000000000000-mapping.dmp
      • memory/1648-77-0x0000000000000000-mapping.dmp
      • memory/1672-95-0x0000000000400000-0x0000000002BA1000-memory.dmp
        Filesize

        39.6MB

      • memory/1672-94-0x0000000000240000-0x0000000000266000-memory.dmp
        Filesize

        152KB

      • memory/1672-63-0x0000000000000000-mapping.dmp
      • memory/1724-67-0x0000000000000000-mapping.dmp
      • memory/1900-59-0x0000000076271000-0x0000000076273000-memory.dmp
        Filesize

        8KB