Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09-06-2021 16:49

General

  • Target

    sample.exe

  • Size

    41KB

  • MD5

    b580c140a245f68291f7d4159272beeb

  • SHA1

    96d61bb4105f2a331bb3d7b733d77666286e8954

  • SHA256

    291dd93ff5ffd7c8c108767855b77b3a1fbae2755cc650b884f42e1903884041

  • SHA512

    5241380c3613e11de37c2125de09b80933b4bd2e8a1def667fd035bea3f0a7c5e5d7707d940fea8d7e4aab1030fac0c03318e84717ba2feccfad7f01b0b1e676

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cock.li
  • Port:
    587
  • Username:
    SendServerInfo@hitler.rocks
  • Password:
    jesuscrypt

Signatures

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1480
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:636

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/636-62-0x0000000000000000-mapping.dmp
  • memory/636-63-0x0000000000500000-0x0000000000501000-memory.dmp
    Filesize

    4KB

  • memory/1268-59-0x00000000013D0000-0x00000000013D1000-memory.dmp
    Filesize

    4KB

  • memory/1268-61-0x0000000004C60000-0x0000000004C61000-memory.dmp
    Filesize

    4KB