Analysis
-
max time kernel
156s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe
-
Size
902KB
-
MD5
2c37cb553314943214dc79d2d5cd95d2
-
SHA1
8d729ace154aae255cc7d20e0038889c1a16b30b
-
SHA256
5cfdb9f856907336025bbd526f7383ae8edbce669348b8e330251dfe21072c8f
-
SHA512
fea37cc09a83b578a2911924becca74df9fa1cec27fe182a455cc88b31c91033ceaee5f32bb4ce4e51cb354156da295c3d5281f383264261be0aa467b2bc6686
-
SSDEEP
24576:0YLeTgdo0x708aTH0wikFauuPZA2FDdEPf:0YLKgDx70j0wikFauuPZAzP
Malware Config
Extracted
formbook
4.1
ndgi
vuicotvxrejp3il.xyz
w3fa6.net
sappuno02.com
konstruksirumah.xyz
usalifehealth.com
and1f.xyz
atenmentfstinfdow.beauty
primepipe.net
roundhouseny.com
alexandermcqueen.icu
transporteavalos.com
spankmetaverse.xyz
jhccowholesale.com
bielefeldgebaeudereinigung.com
saintraphaelschool.com
larifaa.online
dejabrew.info
izabelaeraphael.com
granniestoneet.com
greensourceseed.com
jawaahirulhikmah.com
2lipcolours.com
ginzou.com
vestradgivning.online
atlasdublinresidence.com
bfine.xyz
decision-art.com
nicebayloans.com
pendingissue.biz
troiancircular.com
raftingtennesssee.com
autistal.xyz
purposeinplans.com
socofm.com
dafuweng0471.com
transformcoach.info
vugz.info
isabellesroom.com
kasdawerf.xyz
angelicindia.com
jmakerpumploc.com
departmen.store
kalpataruplotsariaplots.net
mosqueenarbonne.com
tititinews.com
santeoglobal.com
cornharvestdirect.com
chickensoesco.com
softelbow30.com
fuxeonfire.com
soospeter.com
lastikfiyatlari.online
northlandproshop.com
youbelongstojoy.com
asfalt-podrezkovo.store
servequin.com
heti.ink
gulfingroupinvest.com
gastries.info
spunklane.com
acompanhanteslux.com
bbti.world
juiceofjoy.com
tlaaccounting.net
2635westkaylaneprescott.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4256-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exedescription pid process target process PID 2900 set thread context of 4256 2900 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exepid process 4256 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe 4256 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exedescription pid process target process PID 2900 wrote to memory of 4256 2900 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe PID 2900 wrote to memory of 4256 2900 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe PID 2900 wrote to memory of 4256 2900 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe PID 2900 wrote to memory of 4256 2900 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe PID 2900 wrote to memory of 4256 2900 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe PID 2900 wrote to memory of 4256 2900 SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.16304.13478.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2900-132-0x0000000000770000-0x0000000000858000-memory.dmpFilesize
928KB
-
memory/2900-133-0x0000000005820000-0x0000000005DC4000-memory.dmpFilesize
5.6MB
-
memory/2900-134-0x0000000005270000-0x0000000005302000-memory.dmpFilesize
584KB
-
memory/2900-135-0x00000000051E0000-0x00000000051EA000-memory.dmpFilesize
40KB
-
memory/2900-136-0x0000000007A60000-0x0000000007AFC000-memory.dmpFilesize
624KB
-
memory/4256-137-0x0000000000000000-mapping.dmp
-
memory/4256-138-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4256-139-0x0000000001440000-0x000000000178A000-memory.dmpFilesize
3.3MB