Analysis Overview
SHA256
e42ba94ba2b856fdb7aa01b9dee11abd71c55b6fc15e1933a77269deedb57e88
Threat Level: Known bad
The file pass.exe was found to be: Known bad.
Malicious Activity Summary
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
Echelon
Executes dropped EXE
Reads user/profile data of web browsers
Loads dropped DLL
Looks up external IP address via web service
Enumerates physical storage devices
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-07-30 07:54
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-07-30 07:54
Reported
2021-07-30 07:56
Platform
win7v20210408
Max time kernel
116s
Max time network
16s
Command Line
Signatures
Echelon
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\98899.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\pass.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\pass.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | wtfismyip.com | N/A | N/A |
| N/A | wtfismyip.com | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\98899.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\98899.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\98899.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\pass.exe
"C:\Users\Admin\AppData\Local\Temp\pass.exe"
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe
"C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe"
C:\Users\Admin\AppData\Local\Temp\98899.exe
"C:\Users\Admin\AppData\Local\Temp\98899.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 1248
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | wtfismyip.com | udp |
| N/A | 54.39.106.25:443 | wtfismyip.com | tcp |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 54.235.190.106:443 | api.ipify.org | tcp |
| N/A | 8.8.8.8:53 | f0485066.xsph.ru | udp |
| N/A | 141.8.192.151:80 | f0485066.xsph.ru | tcp |
Files
memory/1628-60-0x0000000075551000-0x0000000075553000-memory.dmp
\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe
| MD5 | c10aa673e83a05634292512446b5896d |
| SHA1 | 8ac8a1820c0f907412b8159476348ed690cfbaee |
| SHA256 | 6040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e |
| SHA512 | 2a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67 |
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe
| MD5 | c10aa673e83a05634292512446b5896d |
| SHA1 | 8ac8a1820c0f907412b8159476348ed690cfbaee |
| SHA256 | 6040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e |
| SHA512 | 2a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67 |
memory/1428-62-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe
| MD5 | c10aa673e83a05634292512446b5896d |
| SHA1 | 8ac8a1820c0f907412b8159476348ed690cfbaee |
| SHA256 | 6040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e |
| SHA512 | 2a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67 |
memory/1428-67-0x0000000001090000-0x0000000001091000-memory.dmp
memory/1208-66-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
C:\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
memory/1208-71-0x0000000000970000-0x0000000000971000-memory.dmp
memory/1208-74-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
memory/1428-75-0x00000000025A0000-0x0000000002611000-memory.dmp
memory/1428-76-0x0000000002630000-0x0000000002632000-memory.dmp
memory/1064-77-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
memory/1064-83-0x0000000000270000-0x00000000002D0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-07-30 07:54
Reported
2021-07-30 07:56
Platform
win10v20210410
Max time kernel
17s
Max time network
115s
Command Line
Signatures
Echelon
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\98899.exe | N/A |
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | wtfismyip.com | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
| N/A | wtfismyip.com | N/A | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\98899.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\98899.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\98899.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3700 wrote to memory of 2456 | N/A | C:\Users\Admin\AppData\Local\Temp\pass.exe | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe |
| PID 3700 wrote to memory of 2456 | N/A | C:\Users\Admin\AppData\Local\Temp\pass.exe | C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe |
| PID 3700 wrote to memory of 2740 | N/A | C:\Users\Admin\AppData\Local\Temp\pass.exe | C:\Users\Admin\AppData\Local\Temp\98899.exe |
| PID 3700 wrote to memory of 2740 | N/A | C:\Users\Admin\AppData\Local\Temp\pass.exe | C:\Users\Admin\AppData\Local\Temp\98899.exe |
| PID 3700 wrote to memory of 2740 | N/A | C:\Users\Admin\AppData\Local\Temp\pass.exe | C:\Users\Admin\AppData\Local\Temp\98899.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\pass.exe
"C:\Users\Admin\AppData\Local\Temp\pass.exe"
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe
"C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe"
C:\Users\Admin\AppData\Local\Temp\98899.exe
"C:\Users\Admin\AppData\Local\Temp\98899.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 1924
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | wtfismyip.com | udp |
| N/A | 54.39.106.25:443 | wtfismyip.com | tcp |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 54.235.190.106:443 | api.ipify.org | tcp |
| N/A | 8.8.8.8:53 | discord.com | udp |
| N/A | 162.159.128.233:443 | discord.com | tcp |
| N/A | 8.8.8.8:53 | f0485066.xsph.ru | udp |
| N/A | 141.8.192.151:80 | f0485066.xsph.ru | tcp |
Files
memory/2456-114-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe
| MD5 | c10aa673e83a05634292512446b5896d |
| SHA1 | 8ac8a1820c0f907412b8159476348ed690cfbaee |
| SHA256 | 6040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e |
| SHA512 | 2a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67 |
memory/2740-117-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe
| MD5 | c10aa673e83a05634292512446b5896d |
| SHA1 | 8ac8a1820c0f907412b8159476348ed690cfbaee |
| SHA256 | 6040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e |
| SHA512 | 2a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67 |
C:\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
C:\Users\Admin\AppData\Local\Temp\98899.exe
| MD5 | ac0a9390d50cbc5133523482b31e0735 |
| SHA1 | 4d29f350e46df5672f87095033cdfe3710c58b42 |
| SHA256 | 710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c |
| SHA512 | a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64 |
memory/2456-120-0x0000000000900000-0x0000000000901000-memory.dmp
memory/2740-122-0x0000000000830000-0x0000000000831000-memory.dmp
memory/2456-124-0x0000000003270000-0x00000000032E1000-memory.dmp
memory/2740-125-0x00000000050C0000-0x00000000050C1000-memory.dmp
memory/2456-126-0x0000000001290000-0x0000000001292000-memory.dmp