Analysis
-
max time kernel
168s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe
-
Size
913KB
-
MD5
7b6dcd6fcd1c26b9abdba167929f4c82
-
SHA1
04f11f07ef4a51b16383b5dde94f1af405893b45
-
SHA256
e38f6fab27253171688423b0792d38be81e4c01cceb35c7bca05d2ebfc011ae9
-
SHA512
0a12c658607c69b203f3674a6097b86b925e29d00003b4e1c975e5bd09894eba722af22ced22c0c01ca555657eaa7251a908f36e0fabfe2f521aad9124d6b942
-
SSDEEP
12288:pe+QDdzoa1cfNv+/O/OW9HiiwdIvL94CsAH0vJHlAMMLOV8SWRdXZIQFhZMRR3im:qDdEPflOO/OW9CkL9/fDxiMR/phUz
Malware Config
Extracted
formbook
4.1
b3es
sweets.wtf
apextama.com
tygbs.com
kumaoedu.com
bestbathroomremodeling.club
lnshykj.com
nelsonanddima.com
falunap.info
codyhinrichs.com
2797vip.com
danutka.com
3o2t307a.com
kellymariewest.com
profilelonn.online
procan.website
sopjimmy.com
xn--skdarkae-55ac80i.net
entitymanaged.com
melitadahl.art
joineguru.net
good-meme.com
creditconepts.com
narafconstruction.com
paspsichologa.com
rancho365.com
rimplefeel.com
kingsub.online
cnsrdns.com
billythepainter.com
clientevirtualpdf.net
marycruzruiz.com
renaultcikmaparca.xyz
1600156.com
paymallmart.info
garafe.com
fredrikk.net
gogo-tunisia.space
center-me.com
xiaohuayhq.com
xn--h49a60xt7azzcm91a.com
unidiliobobo.info
libertypolestore.com
20111210.net
atraofix.online
furniron.com
mingyun58.com
shfesmua.com
rdougdigital.life
safsip.com
melon.town
sagihigaibengo.net
ethnicsbyak.com
designoffaitheventsllc.com
dpmforensics.com
ripple-us.net
fuyouhin-happiness.com
conceptweb.online
l453.net
zenars.com
mepcoonlinebill.com
oonn99.xyz
dackus.energy
articvas.com
yayuanlin.com
imperiumtowns.xyz
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4984-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exedescription pid process target process PID 4120 set thread context of 4984 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exeSecuriteInfo.com.Win32.PWSX-gen.27251.20675.exepid process 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe 4984 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe 4984 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exedescription pid process Token: SeDebugPrivilege 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exedescription pid process target process PID 4120 wrote to memory of 1092 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 1092 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 1092 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 4984 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 4984 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 4984 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 4984 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 4984 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe PID 4120 wrote to memory of 4984 4120 SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.27251.20675.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1092-137-0x0000000000000000-mapping.dmp
-
memory/4120-132-0x0000000000FD0000-0x00000000010BA000-memory.dmpFilesize
936KB
-
memory/4120-133-0x0000000006090000-0x0000000006634000-memory.dmpFilesize
5.6MB
-
memory/4120-134-0x0000000005AE0000-0x0000000005B72000-memory.dmpFilesize
584KB
-
memory/4120-135-0x0000000005A40000-0x0000000005A4A000-memory.dmpFilesize
40KB
-
memory/4120-136-0x0000000008160000-0x00000000081FC000-memory.dmpFilesize
624KB
-
memory/4984-138-0x0000000000000000-mapping.dmp
-
memory/4984-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4984-140-0x0000000001400000-0x000000000174A000-memory.dmpFilesize
3.3MB