Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 11:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe
-
Size
940KB
-
MD5
ad4afa925700586e0138bda59adaddb7
-
SHA1
8309a84b841861ccac278fc03a5e213bd6628126
-
SHA256
69c4f08c64ca2809ab57dfb43008d4e197bda7ce1a3613402563660afd6e6226
-
SHA512
48ccbd2a3297246499a252f9a3028f6400ca5199a0158f893ab62a347fc887269d338ef761e8daabe723c24bbb985b242b9091ac054fe541181598b33d5bd5e0
-
SSDEEP
24576:vzq75DWfksa2TEiYxBayY7CdTiwAAgEEY4:8Wfe2Q9xBxDTQp
Malware Config
Extracted
formbook
fqwu
N6XHavFRXQTRmNUkF9dn
EoaWTgFMmLFmUJ7CJNkTiGoj5A==
Dm+WNJDwSQa5cML3Q7EBiGoj5A==
nixR8ZCkOWjqrASBuic=
yvWQNApkdf4QYIih4+xUDY0=
RtmBQtDYDb50g8btXA==
8SU541y9Ec12NYK8PSOfA8OPpaphimY=
/yEvxvlAkquuY3W1QQ==
AlHZgYW4BiI9V+M=
YsHIUsAOO15j+9TnWA==
JJu1S7QIIMij0xUqlUtv
CmWBLrD98YnyUCCFvy0=
uPwhAVEvtu1rTuY=
PI6bR88GVGXmRlpxpKjtBpo=
GnL7qs9HVQAiF6ckF9dn
2zVeBFKZgO1rTuY=
2VI1VpOg7boCAFxvrWN3ys9rovE=
L1lO62zA2o1QEEZRQtgh7g==
brhF5dY1e3zmSyCFvy0=
U6m2TsEidTTdsA5kX8wh7g==
Y4GrS3nIyUXHj/k=
evSlPgVdYBjdnNQkF9dn
7HUCtkRNj6SnY3W1QQ==
2CcvFnrRHTbivh9eoscp8w==
PCHWsTOfyiggoA==
eMDhhNYhdUDuuQ86Rtf+r1kh5g==
hAIp0HnJFT71dXDVEVxv
51Drsv9Lm7eeYs4kF9dn
fhhRAaH0PgGwevs=
SdfrnVWmDwTBBC1Cj/0x65F2anyxGa5yIw==
GmnwkpPh966c7yJboscp8w==
oeeKSEuAzaf7UX4kF9dn
suBtE+pOocVInNgOJYzbLdd+KqZl
5jD94lyYK0h3WHTPBs5l
1ml5Id01WYmVXeslunurQPBqGrNv
1x1aDGSv2ebPIDdQoscp8w==
B3WmLmHc9Z/uuvf9+rQv5A==
1SNZ9WaU/yfocannICNl/bJ+
/TLNgqMHCaqlY3W1QQ==
vgwl3XnGxogDXHOYKRV+z89rovE=
QHQDuawJPgGwevs=
WL3AW/1KmKwk6GuIEw6lJ7mB/VF/mg==
Qa/rog9XmdMA2luADAavtKqmLtGEqGg=
khGlV8AmrkuV9jxxtXTviGoj5A==
REmSMr42vpiX8Pkf
9n2UI6wXL9Iv7neq3kmHy89rovE=
NV1X+5jl5aoa3yCFvy0=
WBIyLpS5SQLE
4m1+PiV4yiggoA==
iAgZzbQCRHIK3z1noscp8w==
mbvEZscYmU1nY3W1QQ==
FCc/7VKc4gYI1kye4dZ/xpI=
vzFA44C49RbCovcclXrviGoj5A==
fuP0tqb28KKoY3W1QQ==
3B0juCCF1ZZaL6jaXSRp+6OB/VF/mg==
3CLPi5T6PAFGI2/Q2jU=
dAUVvorwPgGwevs=
hO8Su1Ce9R+rAhs0uJ8PV+JqGrNv
o+Hxmip4jlfBeAxIgSbSCCJqGrNv
BD1J/4TpGSom9ovHXC9kfRkB6w==
Q4gYqI7l/5jf2iCFvy0=
zsTo+k1FyiggoA==
6GvplQBQYrm+o/wV
GkvZmK0AUmRs4wwnpnzviGoj5A==
attracttitude.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exedescription pid process target process PID 1220 set thread context of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exeSecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exepid process 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe 1116 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exedescription pid process Token: SeDebugPrivilege 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exedescription pid process target process PID 1220 wrote to memory of 816 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 816 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 816 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 816 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe PID 1220 wrote to memory of 1116 1220 SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.1701.27630.3248.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1116-64-0x00000000004012B0-mapping.dmp
-
memory/1116-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1116-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1116-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1116-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1116-67-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1116-68-0x0000000000BF0000-0x0000000000EF3000-memory.dmpFilesize
3.0MB
-
memory/1220-55-0x0000000075141000-0x0000000075143000-memory.dmpFilesize
8KB
-
memory/1220-56-0x00000000002A0000-0x00000000002B6000-memory.dmpFilesize
88KB
-
memory/1220-57-0x00000000002C0000-0x00000000002CE000-memory.dmpFilesize
56KB
-
memory/1220-58-0x0000000005D40000-0x0000000005DCE000-memory.dmpFilesize
568KB
-
memory/1220-59-0x00000000045C0000-0x0000000004616000-memory.dmpFilesize
344KB
-
memory/1220-54-0x0000000000AF0000-0x0000000000BE2000-memory.dmpFilesize
968KB