Analysis

  • max time kernel
    4294182s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    18-03-2022 15:11

General

  • Target

    SECURE_D.exe

  • Size

    1.1MB

  • MD5

    c5c552951da0e502f8aaf0881e2d26bc

  • SHA1

    e279549491a1a76105b0a1d5b258e66de16bd956

  • SHA256

    bda7803bc6a630ed5997870eb0b102e590d6f584b11699fb76781564debe9921

  • SHA512

    e8d414bf468adfdf8c704e667bc8425ddbb02bc69fbe8cf48bd163c515bbdcab58507d834c836604ab385fb8d41b6a2b1a7f497b04c0ac905538fa53076a4c9c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 35 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe
    "C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe"
    1⤵
      PID:1840
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\explorer.exe
        explorer .
        2⤵
          PID:1832
        • C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe
          secure_d
          2⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:972
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:292
        • C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe
          "C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe"
          2⤵
            PID:1008

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/292-61-0x0000000003730000-0x0000000003731000-memory.dmp
          Filesize

          4KB

        • memory/972-70-0x0000000004E86000-0x0000000004E87000-memory.dmp
          Filesize

          4KB

        • memory/972-69-0x0000000004E75000-0x0000000004E86000-memory.dmp
          Filesize

          68KB

        • memory/972-67-0x0000000073DD0000-0x00000000744BE000-memory.dmp
          Filesize

          6.9MB

        • memory/972-68-0x0000000004E70000-0x0000000004E71000-memory.dmp
          Filesize

          4KB

        • memory/972-66-0x0000000000040000-0x000000000015C000-memory.dmp
          Filesize

          1.1MB

        • memory/1008-64-0x0000000000300000-0x0000000000301000-memory.dmp
          Filesize

          4KB

        • memory/1008-62-0x0000000000FC0000-0x00000000010DC000-memory.dmp
          Filesize

          1.1MB

        • memory/1008-65-0x0000000000305000-0x0000000000316000-memory.dmp
          Filesize

          68KB

        • memory/1008-63-0x0000000073E00000-0x00000000744EE000-memory.dmp
          Filesize

          6.9MB

        • memory/1832-59-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp
          Filesize

          8KB

        • memory/1840-54-0x0000000000F30000-0x000000000104C000-memory.dmp
          Filesize

          1.1MB

        • memory/1840-58-0x0000000004565000-0x0000000004576000-memory.dmp
          Filesize

          68KB

        • memory/1840-57-0x0000000004E60000-0x0000000004F10000-memory.dmp
          Filesize

          704KB

        • memory/1840-56-0x0000000004560000-0x0000000004561000-memory.dmp
          Filesize

          4KB

        • memory/1840-55-0x00000000740C0000-0x00000000747AE000-memory.dmp
          Filesize

          6.9MB