Analysis
-
max time kernel
74s -
max time network
134s -
platform
windows10_x64 -
resource
win10 -
submitted
10-07-2020 21:46
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe
-
Size
21KB
-
MD5
5df538e080dbe410f614180e895fa655
-
SHA1
16bb74276eaf9695091befb5f1559893eb10e84e
-
SHA256
62824d9a353a539053724252d3710008e5894f3580fec8449ec38b7828e7b389
-
SHA512
fba134ab40cc2de9c27af6d902b27eda6a88bf3caceba53442c36e533197de8d972e4f65b6c954e59fc8990a5047df01496ea8e73573d06afd9139ef31516cf7
Score
5/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exeAddInProcess32.execmd.exedescription pid process target process PID 3044 wrote to memory of 3448 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess.exe PID 3044 wrote to memory of 3448 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess.exe PID 3044 wrote to memory of 3448 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess.exe PID 3044 wrote to memory of 3448 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess.exe PID 3044 wrote to memory of 3448 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess.exe PID 3044 wrote to memory of 3448 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3044 wrote to memory of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe PID 3872 wrote to memory of 3932 3872 AddInProcess32.exe cmd.exe PID 3872 wrote to memory of 3932 3872 AddInProcess32.exe cmd.exe PID 3872 wrote to memory of 3932 3872 AddInProcess32.exe cmd.exe PID 3932 wrote to memory of 3500 3932 cmd.exe taskkill.exe PID 3932 wrote to memory of 3500 3932 cmd.exe taskkill.exe PID 3932 wrote to memory of 3500 3932 cmd.exe taskkill.exe PID 3932 wrote to memory of 1940 3932 cmd.exe choice.exe PID 3932 wrote to memory of 1940 3932 cmd.exe choice.exe PID 3932 wrote to memory of 1940 3932 cmd.exe choice.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exedescription pid process target process PID 3044 set thread context of 3872 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe AddInProcess32.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3500 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exeAddInProcess32.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3044 SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe Token: SeDebugPrivilege 3872 AddInProcess32.exe Token: SeDebugPrivilege 3500 taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.72.24252.17209.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3872 && choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 38724⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1940-4-0x0000000000000000-mapping.dmp
-
memory/3500-3-0x0000000000000000-mapping.dmp
-
memory/3872-0-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3872-1-0x0000000000426DCE-mapping.dmp
-
memory/3932-2-0x0000000000000000-mapping.dmp