Analysis
-
max time kernel
164s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe
-
Size
791KB
-
MD5
b94ac3cb559832fa92e65b6a127ba7e0
-
SHA1
def0dd941e90de0dc3d077033dbc234e86bcc077
-
SHA256
c1fd700322fe5a908b87744730a34c923c9db9163adc0d018545c4ab285a31b9
-
SHA512
b221425dc8dc5058fed6ef7a7200dde81f89788fc54bc709b261bd7c467737d5528575de33da853828c200bf6c4d83c4a706361d64ffc142ab6b6d3d02034164
-
SSDEEP
12288:vOvEq3qsQx8CuOrz/fsjE+en9+Ijp4mcDTUO95e6ANXJzvFC:zq3qn8CTrz/fswj9+ISmEVC6Ajzv
Malware Config
Extracted
formbook
fqwu
N6XHavFRXQTRmNUkF9dn
EoaWTgFMmLFmUJ7CJNkTiGoj5A==
Dm+WNJDwSQa5cML3Q7EBiGoj5A==
nixR8ZCkOWjqrASBuic=
yvWQNApkdf4QYIih4+xUDY0=
RtmBQtDYDb50g8btXA==
8SU541y9Ec12NYK8PSOfA8OPpaphimY=
/yEvxvlAkquuY3W1QQ==
AlHZgYW4BiI9V+M=
YsHIUsAOO15j+9TnWA==
JJu1S7QIIMij0xUqlUtv
CmWBLrD98YnyUCCFvy0=
uPwhAVEvtu1rTuY=
PI6bR88GVGXmRlpxpKjtBpo=
GnL7qs9HVQAiF6ckF9dn
2zVeBFKZgO1rTuY=
2VI1VpOg7boCAFxvrWN3ys9rovE=
L1lO62zA2o1QEEZRQtgh7g==
brhF5dY1e3zmSyCFvy0=
U6m2TsEidTTdsA5kX8wh7g==
Y4GrS3nIyUXHj/k=
evSlPgVdYBjdnNQkF9dn
7HUCtkRNj6SnY3W1QQ==
2CcvFnrRHTbivh9eoscp8w==
PCHWsTOfyiggoA==
eMDhhNYhdUDuuQ86Rtf+r1kh5g==
hAIp0HnJFT71dXDVEVxv
51Drsv9Lm7eeYs4kF9dn
fhhRAaH0PgGwevs=
SdfrnVWmDwTBBC1Cj/0x65F2anyxGa5yIw==
GmnwkpPh966c7yJboscp8w==
oeeKSEuAzaf7UX4kF9dn
suBtE+pOocVInNgOJYzbLdd+KqZl
5jD94lyYK0h3WHTPBs5l
1ml5Id01WYmVXeslunurQPBqGrNv
1x1aDGSv2ebPIDdQoscp8w==
B3WmLmHc9Z/uuvf9+rQv5A==
1SNZ9WaU/yfocannICNl/bJ+
/TLNgqMHCaqlY3W1QQ==
vgwl3XnGxogDXHOYKRV+z89rovE=
QHQDuawJPgGwevs=
WL3AW/1KmKwk6GuIEw6lJ7mB/VF/mg==
Qa/rog9XmdMA2luADAavtKqmLtGEqGg=
khGlV8AmrkuV9jxxtXTviGoj5A==
REmSMr42vpiX8Pkf
9n2UI6wXL9Iv7neq3kmHy89rovE=
NV1X+5jl5aoa3yCFvy0=
WBIyLpS5SQLE
4m1+PiV4yiggoA==
iAgZzbQCRHIK3z1noscp8w==
mbvEZscYmU1nY3W1QQ==
FCc/7VKc4gYI1kye4dZ/xpI=
vzFA44C49RbCovcclXrviGoj5A==
fuP0tqb28KKoY3W1QQ==
3B0juCCF1ZZaL6jaXSRp+6OB/VF/mg==
3CLPi5T6PAFGI2/Q2jU=
dAUVvorwPgGwevs=
hO8Su1Ce9R+rAhs0uJ8PV+JqGrNv
o+Hxmip4jlfBeAxIgSbSCCJqGrNv
BD1J/4TpGSom9ovHXC9kfRkB6w==
Q4gYqI7l/5jf2iCFvy0=
zsTo+k1FyiggoA==
6GvplQBQYrm+o/wV
GkvZmK0AUmRs4wwnpnzviGoj5A==
attracttitude.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exedescription pid process target process PID 1748 set thread context of 3540 1748 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exepid process 3540 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe 3540 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exedescription pid process target process PID 1748 wrote to memory of 3540 1748 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1748 wrote to memory of 3540 1748 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1748 wrote to memory of 3540 1748 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1748 wrote to memory of 3540 1748 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1748 wrote to memory of 3540 1748 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe PID 1748 wrote to memory of 3540 1748 SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.21214.29334.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1748-132-0x0000000000430000-0x00000000004FC000-memory.dmpFilesize
816KB
-
memory/1748-133-0x00000000053D0000-0x0000000005974000-memory.dmpFilesize
5.6MB
-
memory/1748-134-0x0000000004EC0000-0x0000000004F52000-memory.dmpFilesize
584KB
-
memory/1748-135-0x0000000004E90000-0x0000000004E9A000-memory.dmpFilesize
40KB
-
memory/1748-136-0x0000000008910000-0x00000000089AC000-memory.dmpFilesize
624KB
-
memory/3540-137-0x0000000000000000-mapping.dmp
-
memory/3540-138-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3540-141-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/3540-140-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3540-142-0x0000000001A00000-0x0000000001D4A000-memory.dmpFilesize
3.3MB