Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 21:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe
-
Size
523KB
-
MD5
d335904e0fc1209cced63553bebb5203
-
SHA1
118580c111cd1d5da92c281647cb773d060dfb4b
-
SHA256
55b8c931d255cef1b2541db94a1eea700b9849c253ca5b24f31aeaf272a276c9
-
SHA512
59b89a9148f16fc9e0e9098dcb2f3fc12e146377fc097fc2012ee45800c1c7b7d4c1ef1125b387ffd1be47e46d2eac6f5504b91d2dbd13d28eecc372539a3506
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4040 tmp.exe -
resource yara_rule behavioral2/files/0x000500000001ab6c-4.dat upx behavioral2/files/0x000500000001ab6c-5.dat upx -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Smart_office.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Smart_office.exe cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe Token: 33 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe Token: SeIncBasePriorityPrivilege 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe Token: SeDebugPrivilege 4040 tmp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4040 tmp.exe 4040 tmp.exe 4040 tmp.exe 4040 tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3980 wrote to memory of 756 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe 79 PID 3980 wrote to memory of 756 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe 79 PID 3980 wrote to memory of 756 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe 79 PID 756 wrote to memory of 1176 756 cmd.exe 81 PID 756 wrote to memory of 1176 756 cmd.exe 81 PID 756 wrote to memory of 1176 756 cmd.exe 81 PID 3980 wrote to memory of 4040 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe 82 PID 3980 wrote to memory of 4040 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe 82 PID 3980 wrote to memory of 4040 3980 SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe 82 PID 1176 wrote to memory of 1520 1176 wscript.exe 83 PID 1176 wrote to memory of 1520 1176 wscript.exe 83 PID 1176 wrote to memory of 1520 1176 wscript.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.MSIL11.BQEP.16523.30026.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ru3211.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\thenewinvs.vbs" "C:\Users\Admin\AppData\Local\Temp\anothenwtshit.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\anothenwtshit.bat" "4⤵
- Drops startup file
PID:1520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4040
-