Analysis
-
max time kernel
85s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe
-
Size
791KB
-
MD5
b94ac3cb559832fa92e65b6a127ba7e0
-
SHA1
def0dd941e90de0dc3d077033dbc234e86bcc077
-
SHA256
c1fd700322fe5a908b87744730a34c923c9db9163adc0d018545c4ab285a31b9
-
SHA512
b221425dc8dc5058fed6ef7a7200dde81f89788fc54bc709b261bd7c467737d5528575de33da853828c200bf6c4d83c4a706361d64ffc142ab6b6d3d02034164
-
SSDEEP
12288:vOvEq3qsQx8CuOrz/fsjE+en9+Ijp4mcDTUO95e6ANXJzvFC:zq3qn8CTrz/fswj9+ISmEVC6Ajzv
Malware Config
Extracted
formbook
fqwu
N6XHavFRXQTRmNUkF9dn
EoaWTgFMmLFmUJ7CJNkTiGoj5A==
Dm+WNJDwSQa5cML3Q7EBiGoj5A==
nixR8ZCkOWjqrASBuic=
yvWQNApkdf4QYIih4+xUDY0=
RtmBQtDYDb50g8btXA==
8SU541y9Ec12NYK8PSOfA8OPpaphimY=
/yEvxvlAkquuY3W1QQ==
AlHZgYW4BiI9V+M=
YsHIUsAOO15j+9TnWA==
JJu1S7QIIMij0xUqlUtv
CmWBLrD98YnyUCCFvy0=
uPwhAVEvtu1rTuY=
PI6bR88GVGXmRlpxpKjtBpo=
GnL7qs9HVQAiF6ckF9dn
2zVeBFKZgO1rTuY=
2VI1VpOg7boCAFxvrWN3ys9rovE=
L1lO62zA2o1QEEZRQtgh7g==
brhF5dY1e3zmSyCFvy0=
U6m2TsEidTTdsA5kX8wh7g==
Y4GrS3nIyUXHj/k=
evSlPgVdYBjdnNQkF9dn
7HUCtkRNj6SnY3W1QQ==
2CcvFnrRHTbivh9eoscp8w==
PCHWsTOfyiggoA==
eMDhhNYhdUDuuQ86Rtf+r1kh5g==
hAIp0HnJFT71dXDVEVxv
51Drsv9Lm7eeYs4kF9dn
fhhRAaH0PgGwevs=
SdfrnVWmDwTBBC1Cj/0x65F2anyxGa5yIw==
GmnwkpPh966c7yJboscp8w==
oeeKSEuAzaf7UX4kF9dn
suBtE+pOocVInNgOJYzbLdd+KqZl
5jD94lyYK0h3WHTPBs5l
1ml5Id01WYmVXeslunurQPBqGrNv
1x1aDGSv2ebPIDdQoscp8w==
B3WmLmHc9Z/uuvf9+rQv5A==
1SNZ9WaU/yfocannICNl/bJ+
/TLNgqMHCaqlY3W1QQ==
vgwl3XnGxogDXHOYKRV+z89rovE=
QHQDuawJPgGwevs=
WL3AW/1KmKwk6GuIEw6lJ7mB/VF/mg==
Qa/rog9XmdMA2luADAavtKqmLtGEqGg=
khGlV8AmrkuV9jxxtXTviGoj5A==
REmSMr42vpiX8Pkf
9n2UI6wXL9Iv7neq3kmHy89rovE=
NV1X+5jl5aoa3yCFvy0=
WBIyLpS5SQLE
4m1+PiV4yiggoA==
iAgZzbQCRHIK3z1noscp8w==
mbvEZscYmU1nY3W1QQ==
FCc/7VKc4gYI1kye4dZ/xpI=
vzFA44C49RbCovcclXrviGoj5A==
fuP0tqb28KKoY3W1QQ==
3B0juCCF1ZZaL6jaXSRp+6OB/VF/mg==
3CLPi5T6PAFGI2/Q2jU=
dAUVvorwPgGwevs=
hO8Su1Ce9R+rAhs0uJ8PV+JqGrNv
o+Hxmip4jlfBeAxIgSbSCCJqGrNv
BD1J/4TpGSom9ovHXC9kfRkB6w==
Q4gYqI7l/5jf2iCFvy0=
zsTo+k1FyiggoA==
6GvplQBQYrm+o/wV
GkvZmK0AUmRs4wwnpnzviGoj5A==
attracttitude.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exedescription pid process target process PID 1308 set thread context of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exepid process 580 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exedescription pid process target process PID 1308 wrote to memory of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1308 wrote to memory of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1308 wrote to memory of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1308 wrote to memory of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1308 wrote to memory of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1308 wrote to memory of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1308 wrote to memory of 580 1308 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/580-64-0x00000000004012B0-mapping.dmp
-
memory/580-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/580-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/580-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/580-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/580-67-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/580-68-0x0000000000AF0000-0x0000000000DF3000-memory.dmpFilesize
3.0MB
-
memory/1308-55-0x00000000766F1000-0x00000000766F3000-memory.dmpFilesize
8KB
-
memory/1308-56-0x0000000000440000-0x0000000000456000-memory.dmpFilesize
88KB
-
memory/1308-57-0x00000000003E0000-0x00000000003EE000-memory.dmpFilesize
56KB
-
memory/1308-58-0x0000000007DE0000-0x0000000007E76000-memory.dmpFilesize
600KB
-
memory/1308-59-0x0000000005CC0000-0x0000000005D1C000-memory.dmpFilesize
368KB
-
memory/1308-54-0x0000000000A20000-0x0000000000AEC000-memory.dmpFilesize
816KB