Analysis

  • max time kernel
    180s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    27-04-2022 18:34

General

  • Target

    4972624436d63615a384952d200b3a55258a590ccf0c613d9e37e5418e120e42.exe

  • Size

    207KB

  • MD5

    0a6533f28d8fd2c0787b0efd3639f5ed

  • SHA1

    4ce9dd199563540da0ed450927e66b46f414e414

  • SHA256

    4972624436d63615a384952d200b3a55258a590ccf0c613d9e37e5418e120e42

  • SHA512

    c38080f0ee9a398252e567e9d9ae87692e0a31e51bd3400972c6b86b68983e15fc0556db97d5c27226ee8b08e0be52c68d600e30fc31cc01a59c32340cd13722

Malware Config

Signatures

  • suricata: ET MALWARE TSPY_BANKER.IDV/Infostealer.Bancos Module Download

    suricata: ET MALWARE TSPY_BANKER.IDV/Infostealer.Bancos Module Download

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies WinLogon 2 TTPs 11 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4972624436d63615a384952d200b3a55258a590ccf0c613d9e37e5418e120e42.exe
    "C:\Users\Admin\AppData\Local\Temp\4972624436d63615a384952d200b3a55258a590ccf0c613d9e37e5418e120e42.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2268

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

3
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gbfCD1.tmp
    Filesize

    25KB

    MD5

    d471b32dcd464e9e7fc14f940d14c4ad

    SHA1

    e57c539a91521e372fc427b271afe9567641e5d5

    SHA256

    3c25589f7e5ca3f5201049a45132180fa2ab9b02865705798675f4b7fb803dc1

    SHA512

    7cb29a6ddaeb11ca696fd13a3cab2b90aecaedb28c3693fb292731610665e77431c2c88f7f3fb0ae976a28a5eda0460e2d8ef6db65efdf368c1e1ebd1129a1c9