Resubmissions

14/06/2020, 05:31

200614-naxxd61ea6 8

Analysis

  • max time kernel
    277s
  • max time network
    283s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    14/06/2020, 05:31

General

  • Target

    github.exe

  • Size

    26KB

  • MD5

    bdd14abd6825eb1c3c4b1c71d65a637c

  • SHA1

    a88c9f6cf48c95356a8bc339ef64497127f881a9

  • SHA256

    1d28929f9b02c36ab2c65f916eb2d3b4bd36957c1dee8144a70d51d99d1da9d8

  • SHA512

    8e22bc72091af2e3a931d06bb6fa2e106618784379dd9ea988654c34232104533a50b2e0125650585424a94fa2d4cdf54590ffdbc0c4d66b57a3b647a4e77eb3

Malware Config

Signatures

  • Drops file in Program Files directory 2569 IoCs
  • Drops file in Windows directory 1011 IoCs
  • Program crash 1 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 153 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Modifies service 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Modifies registry class 122 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Drops file in System32 directory 182 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\github.exe
    "C:\Users\Admin\AppData\Local\Temp\github.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Drops file in Drivers directory
    • Drops file in System32 directory
    PID:272
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1876
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Read-me! 0 .html
      1⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • Modifies Internet Explorer settings
      • Checks whether UAC is enabled
      • Suspicious use of SetWindowsHookEx
      PID:984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Checks whether UAC is enabled
        • Suspicious use of SetWindowsHookEx
        PID:1756
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1216 -s 2580
      1⤵
      • Program crash
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1776
      • C:\Windows\Explorer.EXE
        "C:\Windows\Explorer.EXE"
        2⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Modifies Installed Components in the registry
        • Suspicious use of WriteProcessMemory
        • Modifies service
        • Modifies Internet Explorer settings
        • Checks whether UAC is enabled
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1840
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:1156

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/984-10-0x0000000004370000-0x0000000004371000-memory.dmp

        Filesize

        4KB

      • memory/984-6-0x0000000004370000-0x0000000004371000-memory.dmp

        Filesize

        4KB

      • memory/984-4-0x0000000004080000-0x0000000004081000-memory.dmp

        Filesize

        4KB

      • memory/984-8-0x0000000004370000-0x0000000004371000-memory.dmp

        Filesize

        4KB

      • memory/1776-1-0x0000000003270000-0x0000000003281000-memory.dmp

        Filesize

        68KB

      • memory/1776-0-0x0000000001D80000-0x0000000001D91000-memory.dmp

        Filesize

        68KB

      • memory/1840-142-0x000000000A290000-0x000000000A294000-memory.dmp

        Filesize

        16KB

      • memory/1840-102-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

        Filesize

        4KB

      • memory/1840-98-0x0000000002900000-0x0000000002901000-memory.dmp

        Filesize

        4KB

      • memory/1840-28-0x00000000044A0000-0x00000000044A1000-memory.dmp

        Filesize

        4KB

      • memory/1840-143-0x000000000A290000-0x000000000A294000-memory.dmp

        Filesize

        16KB

      • memory/1840-144-0x000000000A290000-0x000000000A294000-memory.dmp

        Filesize

        16KB

      • memory/1840-145-0x000000000A290000-0x000000000A294000-memory.dmp

        Filesize

        16KB

      • memory/1840-146-0x0000000005030000-0x0000000005031000-memory.dmp

        Filesize

        4KB

      • memory/1840-147-0x0000000005030000-0x0000000005031000-memory.dmp

        Filesize

        4KB

      • memory/1840-152-0x0000000005000000-0x0000000005001000-memory.dmp

        Filesize

        4KB

      • memory/1840-159-0x0000000005030000-0x0000000005031000-memory.dmp

        Filesize

        4KB

      • memory/1840-160-0x0000000005030000-0x0000000005031000-memory.dmp

        Filesize

        4KB