Analysis
-
max time kernel
63s -
max time network
72s -
platform
windows10_x64 -
resource
win10 -
submitted
11/07/2020, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Heri.31591.21349.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Heri.31591.21349.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Win32.Heri.31591.21349.exe
-
Size
376KB
-
MD5
5614c61123bd258268b2798cb0077656
-
SHA1
81fae3e277fe42a51093a48d1fc94821665b7728
-
SHA256
521433d5e57056d9453e33f572757e5dde402d9b97b4edee522bff7dcaea579e
-
SHA512
dacabf0fd4726eb73118c3c97e11fc02b0a99c05505dd42aadb9d14e7a5ccdd6692e1f0ca7b4a98e526defb1336aa6cc86a8082bcb678d642967c40822c78713
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2072 3888 SecuriteInfo.com.Win32.Heri.31591.21349.exe 67 PID 3888 wrote to memory of 2072 3888 SecuriteInfo.com.Win32.Heri.31591.21349.exe 67 PID 3888 wrote to memory of 2072 3888 SecuriteInfo.com.Win32.Heri.31591.21349.exe 67 PID 3888 wrote to memory of 3352 3888 SecuriteInfo.com.Win32.Heri.31591.21349.exe 68 PID 3888 wrote to memory of 3352 3888 SecuriteInfo.com.Win32.Heri.31591.21349.exe 68 PID 3888 wrote to memory of 3352 3888 SecuriteInfo.com.Win32.Heri.31591.21349.exe 68 -
Executes dropped EXE 2 IoCs
pid Process 2072 jfiag_gg.exe 3352 jfiag_gg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3352 jfiag_gg.exe 3352 jfiag_gg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kissq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kissq.exe" SecuriteInfo.com.Win32.Heri.31591.21349.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Heri.31591.21349.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Heri.31591.21349.exe"1⤵
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3352
-