Analysis Overview
SHA256
74499fe96913a5ec1b89d8b79ca8bf2d3fd598c0d65339bd6d6223599f20aa7b
Threat Level: Known bad
The file mySThe.exe was found to be: Known bad.
Malicious Activity Summary
Echelon
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Reads user/profile data of web browsers
Looks up external IP address via web service
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-07-30 08:02
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-07-30 08:02
Reported
2021-07-30 08:05
Platform
win7v20210410
Max time kernel
12s
Max time network
35s
Command Line
Signatures
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\mySThe.exe
"C:\Users\Admin\AppData\Local\Temp\mySThe.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 50.19.92.227:443 | api.ipify.org | tcp |
| N/A | 8.8.8.8:53 | f0485066.xsph.ru | udp |
| N/A | 141.8.192.151:80 | f0485066.xsph.ru | tcp |
Files
memory/916-60-0x00000000008F0000-0x00000000008F1000-memory.dmp
memory/916-62-0x00000000024B0000-0x0000000002521000-memory.dmp
memory/916-63-0x000000001B470000-0x000000001B472000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-07-30 08:02
Reported
2021-07-30 08:05
Platform
win10v20210408
Max time kernel
17s
Max time network
112s
Command Line
Signatures
Echelon
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\mySThe.exe
"C:\Users\Admin\AppData\Local\Temp\mySThe.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 54.235.121.178:443 | api.ipify.org | tcp |
| N/A | 8.8.8.8:53 | f0485066.xsph.ru | udp |
| N/A | 141.8.192.151:80 | f0485066.xsph.ru | tcp |
Files
memory/4016-114-0x00000000005E0000-0x00000000005E1000-memory.dmp
memory/4016-116-0x0000000001080000-0x00000000010F1000-memory.dmp
memory/4016-117-0x000000001C450000-0x000000001C452000-memory.dmp