Analysis
-
max time kernel
82s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 16:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe
-
Size
552KB
-
MD5
4a20a8cc90118bd227dc8c34451da980
-
SHA1
32516d8174aa9c0a7d31b3d3457783dea0756e06
-
SHA256
567deb123c5d32e9af005cc681340d95fce92e73cf198db892c0d2b9b0e2a38f
-
SHA512
0b14532f3571c52178b4d2fb579895d7e34d9a7bbe8b9a379649ceb610d8c209810809ff70ec62b984adca63f3082f8ba2b7a8ab491e018fbafbf51fb3ac090e
-
SSDEEP
12288:uqz6CeZtZWbkx5THT4aecA29ZP22Sx4sJYsAe/S9jq:p1eZSsJPA29ZPZt4Ab9j
Malware Config
Extracted
formbook
qmpa
IEiN8oqOnNUEkfZd
LWyAr1P5PHPV
tMGP9gYCIc9DKQ==
fWi2stCh2E3DBWuEK612
B3LCCi2JvPxfNA==
NjLnNjX+DDWt/VuEK612
AvK5/JdMDLztPRg=
U+zn2FswDLztPRg=
3bRIXGwsIc9DKQ==
EXmAoj3/7Cyl+VuEK612
1gkKPklP1odxx7c/Zm+L6HeV4g==
1cMaHDg0ypV0vbT2Ibh+/5Cj5xmAVxA=
MSyBdIV+6nFRloTQAwmFklQ=
qilszGJvhMUsHgaUx/MNSKuo6A==
WYKLwmYEij4q2Hy6sOc=
sjII/IyFmORBFPJ2dVjpG0Q=
mTjzaRwZ9OsEkfZd
iL27vFhbX5ECbBIJxvJKbPHFf9M=
5A5Xr0D5PHPV
IpxsaTO4a1/I
O0akl/OtJu4=
W/Uo1VYpCLztPRg=
TxppXmMgUNC7BQOgzfIMSKuo6A==
R9Qsn1NYXIn0L9fTueU=
O5nTCTAIUYiqFQU=
qUA5LcysmdcEkfZd
jzY2a8iJvPxfNA==
G3Sjzt+b4lfVJo/AOp24sw==
pXEEKkfNMVnK
S6Cz2nc10oNrsJ0P+fA6jH48paMTEw==
sIDiCIeUrOAEkfZd
wKQkm/9lVVnI
uiIfKsOIQjwn8J2V5J1r
zHF4c+ypQ7ztPRg=
KwzbHrpTv3laKtfTueU=
k6JZiCC1KtFSIwiZk47UDt64Yss=
2fLFESoxpllKl5KxYXiW9toW+3DhXwE=
7VAnHMvgw84gTPYPyw==
ArIxekAPMmnRInupMqXfEUA=
ASdaAujYAQRRPg==
4h0THru60PsqyyGCBax+
6Ko6ZoljwEKxwljcDEOZuw==
gjO1ys5bRoj94slTOp24sw==
x4IVLlJKz4x/ybAzVoWSTt64Yss=
ilPsNVL6IaVE0bkfc+w=
wCKB0/SQg704jfUv3/wSSKuo6A==
+eR0tEZJMepVMA==
U42K55D5PHPV
goRIp7OCvDSpg20JCAE/rGT6/w==
2SoyM+br3hJySS1aDQoQZXe784VlUAU=
4LE7N1ZjxDsdfXYAGAzoUV0=
Z9D0XXcxIc9DKQ==
50BLU/bJfGFWsqJD76Yrr3H8
bHozX/y2emhZnX/3FxMQSKuo6A==
ETn+luu5Ugm4IkmeMBDfTcUDByHHFQ==
DWeErEUN29PLqCBSde+C6Z21HgbBWAkLRA==
ervK+g4HIc9DKQ==
/eaqAhTqH4X/5bEhHgzoUV0=
JUtMz3n5PHPV
LT8KV/+eGcivBfE8HwzoUV0=
/xyfrdbaaSMUdmW3/qcrr3H8
ZgQYKcKUKOPQtBidD5krr3H8
Qcd6yWA3xM1ftS1xI/t/BPCeS8M=
nmDfwNfXAQRRPg==
erwgcb.top
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exedescription pid process target process PID 892 set thread context of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exepid process 952 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exedescription pid process target process PID 892 wrote to memory of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe PID 892 wrote to memory of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe PID 892 wrote to memory of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe PID 892 wrote to memory of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe PID 892 wrote to memory of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe PID 892 wrote to memory of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe PID 892 wrote to memory of 952 892 SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.389.16151.14322.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/892-54-0x0000000000FD0000-0x000000000105A000-memory.dmpFilesize
552KB
-
memory/892-55-0x0000000075131000-0x0000000075133000-memory.dmpFilesize
8KB
-
memory/892-56-0x0000000000310000-0x0000000000326000-memory.dmpFilesize
88KB
-
memory/892-57-0x0000000000640000-0x000000000064E000-memory.dmpFilesize
56KB
-
memory/892-58-0x0000000005260000-0x00000000052D0000-memory.dmpFilesize
448KB
-
memory/892-59-0x0000000000740000-0x0000000000774000-memory.dmpFilesize
208KB
-
memory/952-60-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/952-61-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/952-64-0x00000000004012B0-mapping.dmp
-
memory/952-63-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/952-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/952-67-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/952-68-0x00000000008E0000-0x0000000000BE3000-memory.dmpFilesize
3.0MB