Analysis Overview
SHA256
74499fe96913a5ec1b89d8b79ca8bf2d3fd598c0d65339bd6d6223599f20aa7b
Threat Level: Known bad
The file mySThe.exe was found to be: Known bad.
Malicious Activity Summary
Echelon
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Reads user/profile data of web browsers
Looks up external IP address via web service
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-07-30 07:53
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-07-30 07:53
Reported
2021-07-30 07:56
Platform
win7v20210408
Max time kernel
120s
Max time network
163s
Command Line
Signatures
Echelon
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\mySThe.exe
"C:\Users\Admin\AppData\Local\Temp\mySThe.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 54.235.88.121:443 | api.ipify.org | tcp |
| N/A | 8.8.8.8:53 | f0485066.xsph.ru | udp |
| N/A | 141.8.192.151:80 | f0485066.xsph.ru | tcp |
Files
memory/1988-60-0x0000000000820000-0x0000000000821000-memory.dmp
memory/1988-62-0x000000001AD80000-0x000000001ADF1000-memory.dmp
memory/1988-63-0x000000001B7E0000-0x000000001B7E2000-memory.dmp
memory/1988-64-0x000000001B7E6000-0x000000001B805000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-07-30 07:53
Reported
2021-07-30 07:55
Platform
win10v20210410
Max time kernel
14s
Max time network
113s
Command Line
Signatures
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\mySThe.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\mySThe.exe
"C:\Users\Admin\AppData\Local\Temp\mySThe.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 54.243.175.83:443 | api.ipify.org | tcp |
| N/A | 8.8.8.8:53 | f0485066.xsph.ru | udp |
| N/A | 141.8.192.151:80 | f0485066.xsph.ru | tcp |
Files
memory/4020-114-0x0000000000270000-0x0000000000271000-memory.dmp
memory/4020-116-0x0000000002FA0000-0x0000000003011000-memory.dmp
memory/4020-117-0x000000001C060000-0x000000001C062000-memory.dmp