Analysis
-
max time kernel
17s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
30-07-2021 07:54
Static task
static1
Behavioral task
behavioral1
Sample
pass.exe
Resource
win7v20210408
General
-
Target
pass.exe
-
Size
863KB
-
MD5
a27ba5e68cdd7333b8cd5e4ebd558019
-
SHA1
c4e6d99f3979003424ad4cc511a36434944c02b0
-
SHA256
e42ba94ba2b856fdb7aa01b9dee11abd71c55b6fc15e1933a77269deedb57e88
-
SHA512
2edfb1bae88e3088da81fbcf382fa7955998562817eb9f25bfaef6d82cbeb064c93764d1f9f127ad667543854109da6df84938cbb8d9b62eabf3a00ee5699ff1
Malware Config
Signatures
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Executes dropped EXE 2 IoCs
Processes:
CoderVir Stealer Love Lolz.guru.exe98899.exepid process 2456 CoderVir Stealer Love Lolz.guru.exe 2740 98899.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 wtfismyip.com 9 api.ipify.org 10 api.ipify.org 7 wtfismyip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3640 2740 WerFault.exe 98899.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
98899.exeWerFault.exeCoderVir Stealer Love Lolz.guru.exepid process 2740 98899.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 3640 WerFault.exe 2456 CoderVir Stealer Love Lolz.guru.exe 2456 CoderVir Stealer Love Lolz.guru.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
98899.exeCoderVir Stealer Love Lolz.guru.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2740 98899.exe Token: SeDebugPrivilege 2456 CoderVir Stealer Love Lolz.guru.exe Token: SeRestorePrivilege 3640 WerFault.exe Token: SeBackupPrivilege 3640 WerFault.exe Token: SeDebugPrivilege 3640 WerFault.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
pass.exedescription pid process target process PID 3700 wrote to memory of 2456 3700 pass.exe CoderVir Stealer Love Lolz.guru.exe PID 3700 wrote to memory of 2456 3700 pass.exe CoderVir Stealer Love Lolz.guru.exe PID 3700 wrote to memory of 2740 3700 pass.exe 98899.exe PID 3700 wrote to memory of 2740 3700 pass.exe 98899.exe PID 3700 wrote to memory of 2740 3700 pass.exe 98899.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pass.exe"C:\Users\Admin\AppData\Local\Temp\pass.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe"C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\98899.exe"C:\Users\Admin\AppData\Local\Temp\98899.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 19243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ac0a9390d50cbc5133523482b31e0735
SHA14d29f350e46df5672f87095033cdfe3710c58b42
SHA256710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c
SHA512a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64
-
MD5
ac0a9390d50cbc5133523482b31e0735
SHA14d29f350e46df5672f87095033cdfe3710c58b42
SHA256710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c
SHA512a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64
-
MD5
c10aa673e83a05634292512446b5896d
SHA18ac8a1820c0f907412b8159476348ed690cfbaee
SHA2566040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e
SHA5122a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67
-
MD5
c10aa673e83a05634292512446b5896d
SHA18ac8a1820c0f907412b8159476348ed690cfbaee
SHA2566040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e
SHA5122a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67