Analysis
-
max time kernel
155s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 04:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe
-
Size
448KB
-
MD5
19570ae7d752c7f688b833193352a7cb
-
SHA1
c5b129ea601cd6b1bb2d3fbd3b597ed434ed70af
-
SHA256
6eec1a8da601b90f81fdb28221702581d5a1698201976958fb160b2d956edb19
-
SHA512
1cfa750a02c23bf3b9d2545033a210d2bbfc3947b472be62e485d09f683f864acc146e6b3af880d46150bd77fae17285ed0be1420540e7674e4b4c0d9a439c5a
-
SSDEEP
12288:cYEsiw+tb/EPYxNdaGJd4t6O59rxjDqIwjOS5tKl6Nz3OFTj:1ElXtLDgGct7pRwjR5El6NTOB
Malware Config
Extracted
formbook
codp
WLwbp9IgDF0DRbuq
oNQ7DHBzVHVMTxxxFCORk65Z5w==
eKyDm2P0S8i8tXrGSRxyN/GB+g==
DWLDupksnDvfKi7Q7PI=
JAaYbOFx1G0f4pcM36gDB3YaG796
KWQ71Z4U7+2Nv8K72OXED5M9oe8=
YJpvEHW5TU/wL02R9TiN0A==
tpQX78fPprFMi7ocSgXfUNYKpTq33Icp
a9Z0eju3FKFA/YBy+MQfG3QaG796
uQzt58fSssDUenxacQCY2g==
vijGzYPYOfi2gxZLhlbA
kZfzlQg7IGPxc29BJA==
dcQu+blQlxGyZu7qw5P4L6s=
TTIXAcXMr85yqqvxWBMqdrw=
xZb/tyGC8sOjIS7Q7PI=
KnzenvO+cXkVS3biKfRDwJ9Q5Q==
ZqZvDt9+yYxqh1Si
vZD8CtVZigY/cqnmLA==
QJy2dd/p0MO1Ji7Q7PI=
l+Hmoea3jsiAcqnmLA==
j19MVSQr/CceRbwAwBMqdrw=
vS+9sWn2gDVJYeHZaHTPCN9ywAEKVg==
blpyOo9dQZt5ZxddwQVmww==
IOs9KPQyS0gISA==
nn/ZeuJwB9m55jogOw==
M49wUTbsPAwOcqnmLA==
WqL2DMvly8XMWUkzLPvkgjf1aM5QNRk=
fd7UqRCiNTCiTs+3
vY9pE5GVeJJKMpNw0Imsk65Z5w==
PoplGWGv//+qJC7Q7PI=
d8msQUS/1UNH
g3JQ+nF3X3cfRU7V4us=
CEaYiEEOXyvzU07V4us=
lWFpIAPKKBaU90M=
TzIO/uHUaDELiHVWcQCY2g==
C23Tr3r7VMWspGfecQCY2g==
nqSKdTr0YhS+hBlLhlbA
tqY5MRsZX3MVS0YS8eY=
9MouOBNcWth14KOG9e1CFHYaG796
pKi80FPSajXvnxxLhlbA
RBb0/dHxCF8DRbuq
H2JA8ah0Bg4ScqnmLA==
Ui6WUnCpdrSBlN+xk1450g==
dXUNxi54AIl/E/W/tLmhAJM9oe8=
g8SPLINNHWVYb9gTSBMqdrw=
ld0F/BjbTxaU90M=
jmTquCeAzJmZHGHL7sydCpM9oe8=
K25MOh0tGDTYolGNUQ1yxw==
B1Ozd8XF67PJZGdHJA==
Py0TshQX8wvo4n5WcQCY2g==
G378nwBW6hJ73dDIcfo=
lebDk/+/1UNH
sO5QF9cf+lLssy7Q7PI=
mu50P/Y9kRfOLS7Q7PI=
Akgd/+60CxK1KVo=
wxp6MYyFq4coVQ==
XinIiM8UXijMrUh19sfnOvav
N7THlsfP5amkUA==
DoafUba91Bo1xbahrLegAJM9oe8=
owwVtzbvRgDKNXLAzqwrDNGFpTe33Icp
kQMRCcXUvNWa4OrZxJFt9JM9oe8=
ViF1HZskhw7WOrenND/Q2ZVRhy+33Icp
3rGLk2t/q4coVQ==
L2/L3M8P5DMaGpN/6LvKmJM9oe8=
gameikanjoker123.com
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EC4D2078098B40A1AC62271E1A5ECF13 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe\"" SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exeCasPol.exechkdsk.exedescription pid process target process PID 660 set thread context of 1944 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe CasPol.exe PID 1944 set thread context of 2724 1944 CasPol.exe Explorer.EXE PID 4352 set thread context of 2724 4352 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Processes:
chkdsk.exedescription ioc process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
CasPol.exechkdsk.exepid process 1944 CasPol.exe 1944 CasPol.exe 1944 CasPol.exe 1944 CasPol.exe 1944 CasPol.exe 1944 CasPol.exe 1944 CasPol.exe 1944 CasPol.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2724 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exepid process 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
CasPol.exechkdsk.exepid process 1944 CasPol.exe 1944 CasPol.exe 1944 CasPol.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe 4352 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exeCasPol.exechkdsk.exedescription pid process Token: SeDebugPrivilege 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe Token: SeDebugPrivilege 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe Token: SeLoadDriverPrivilege 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe Token: SeDebugPrivilege 1944 CasPol.exe Token: SeDebugPrivilege 4352 chkdsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SecuriteInfo.com.Win64.Evo-gen.8877.18401.exeExplorer.EXEchkdsk.exedescription pid process target process PID 660 wrote to memory of 1944 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe CasPol.exe PID 660 wrote to memory of 1944 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe CasPol.exe PID 660 wrote to memory of 1944 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe CasPol.exe PID 660 wrote to memory of 1944 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe CasPol.exe PID 660 wrote to memory of 1944 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe CasPol.exe PID 660 wrote to memory of 1944 660 SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe CasPol.exe PID 2724 wrote to memory of 4352 2724 Explorer.EXE chkdsk.exe PID 2724 wrote to memory of 4352 2724 Explorer.EXE chkdsk.exe PID 2724 wrote to memory of 4352 2724 Explorer.EXE chkdsk.exe PID 4352 wrote to memory of 4520 4352 chkdsk.exe Firefox.exe PID 4352 wrote to memory of 4520 4352 chkdsk.exe Firefox.exe PID 4352 wrote to memory of 4520 4352 chkdsk.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Evo-gen.8877.18401.exe"2⤵
- Sets service image path in registry
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4520