Analysis
-
max time kernel
103s -
max time network
101s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 19:30
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe
-
Size
1.8MB
-
MD5
df44e606f03e953e2407f6952993e094
-
SHA1
001411061628905aaf57e9f9ac4036ceced91f79
-
SHA256
61e1c319c54ed2c6ff60c0fa623f66189aa25a71854e06ffdb408e928bf01832
-
SHA512
37ad4cc8dc47c9419dbdea83c252d1c8229325c6f135576f2b7871b5fed22f9bc32603f49f84ca7593c516c0e82aa43498d89aaca7d7413611d3179d3e3c4ca2
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exeSecuriteInfo.com.Win32.Kryptik.HDBX.19253.exepid process 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe 1784 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe 1784 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SecuriteInfo.com.Win32.Kryptik.HDBX.19253.execmd.exedescription pid process target process PID 1852 wrote to memory of 1784 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe PID 1852 wrote to memory of 1784 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe PID 1852 wrote to memory of 1784 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe PID 1852 wrote to memory of 1784 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe PID 1852 wrote to memory of 1648 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe cmd.exe PID 1852 wrote to memory of 1648 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe cmd.exe PID 1852 wrote to memory of 1648 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe cmd.exe PID 1852 wrote to memory of 1648 1852 SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe cmd.exe PID 1648 wrote to memory of 1596 1648 cmd.exe PING.EXE PID 1648 wrote to memory of 1596 1648 cmd.exe PING.EXE PID 1648 wrote to memory of 1596 1648 cmd.exe PING.EXE PID 1648 wrote to memory of 1596 1648 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Kryptik.HDBX.19253.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe