Analysis
-
max time kernel
65s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-03-2021 02:05
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe
-
Size
2.2MB
-
MD5
a6142de2699d423a11dd8e21a6f619a1
-
SHA1
d8009583e2da6bf00ec4e327c3949306cd467b98
-
SHA256
1ccc7c5ad9f6685164eb8fcc6bc8e94db915167375946f04841bf6ac0972674e
-
SHA512
d1fb690a4e88e86d35e3bbae2bcc60413dba3f9496da197d5e5e029bc48ceed8216f017f90c294fefb43fdbbc77229a3f6e07aa496dddd5c00684b4653c49ead
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exedescription pid process target process PID 1908 wrote to memory of 1896 1908 SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe PID 1908 wrote to memory of 1896 1908 SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe PID 1908 wrote to memory of 1896 1908 SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.WizzMonetize.1.3832.21500.exe" 12⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1896-5-0x0000000000000000-mapping.dmp
-
memory/1896-6-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmpFilesize
9.6MB
-
memory/1896-7-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmpFilesize
9.6MB
-
memory/1896-8-0x0000000002000000-0x0000000002002000-memory.dmpFilesize
8KB
-
memory/1908-2-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmpFilesize
9.6MB
-
memory/1908-3-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmpFilesize
9.6MB
-
memory/1908-4-0x00000000021A0000-0x00000000021A2000-memory.dmpFilesize
8KB