Analysis
-
max time kernel
75s -
max time network
118s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 19:14
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exe
-
Size
162KB
-
MD5
4a2f69f6f9905171f39674eb3da90c58
-
SHA1
fe5f253dad3ffcfa36419597289dc8045cb50b9a
-
SHA256
4e890d4e6329b4ea3bc61d458e727a81cdf9358d6b5bedbd290aa85ed7a189d1
-
SHA512
faa430799b1573158ca4626f1a4f5c5be48d1b4b4a042a60a3a5dc7c2c2057ebf289b8c85abf79a1dc11adaeb691dacbedcdfdd5ddd62fc8f9226d9466abc992
Score
6/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3100 SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exe Token: SeRestorePrivilege 3836 WerFault.exe Token: SeBackupPrivilege 3836 WerFault.exe Token: SeDebugPrivilege 3836 WerFault.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3836 3100 WerFault.exe SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe 3836 WerFault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Downloader.MSIL.CBNB.9962.21684.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 17482⤵
- Suspicious use of AdjustPrivilegeToken
- Program crash
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3836-0-0x0000000004180000-0x0000000004181000-memory.dmpFilesize
4KB
-
memory/3836-1-0x0000000004580000-0x0000000004581000-memory.dmpFilesize
4KB
-
memory/3836-2-0x0000000004980000-0x0000000004981000-memory.dmpFilesize
4KB
-
memory/3836-3-0x0000000004D80000-0x0000000004D81000-memory.dmpFilesize
4KB