Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 06:28
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe
Resource
win7-20220901-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe
-
Size
377KB
-
MD5
0948fd22d21033168c4de1e444ad0bfe
-
SHA1
a35c4178b2fa57630c9af5ca9b9debd34fcfc06e
-
SHA256
c0d25313398ba441d25a991187ba627d706b3f108f6f235b28e863648abfbe9b
-
SHA512
6957a08d29c9078d92546e45f62b350557f534e822a45bfbb313b6090d11028eff2c53386e4cfca0a2a721d67e5f233c9ff1aa784246244628670804af639583
-
SSDEEP
6144:PmRqmK4Ls9O5F7t4v81bGDmW4WCViYSCXEpSXUh4jCXVNsZvypaBAINGuy2tJ8:PmR0ws9OKTJV3rNsZ86ARa
Malware Config
Extracted
formbook
ermr
ErOK6LFCgNIAlQmH54oaYOL/CN29Z78=
qNSdDhu/PT/1fgafDagiCSZH1SY=
wLpPOAkYS8EABl3pHGc4hNT/Q1sHBrU=
jSxRvptHkeTGl7PT0SEmaZmjqzanuA==
b91oL+2wCcpyhnd6yvF6Pg==
mr81yp1/qqZX
hy7Xsz/PU/LWHMcGL4UYJx9n3A==
KlwrHt1gouPaXaWhoQ==
ng8M320IRJL9Ptw=
8GQbOXuaWxvKnNM=
XndOL7E5sNpVUNty4d/a
rryPBBC8PybYb+2h2MF3FHGL
kEoeyERSVCYO0g==
5/P+SBDby5hO
1fYXc30/h9W7iO17
34X+YKR+wRFE
8ir/X2MlVByh5lQ1ow8=
u9ikm2UMZ7J7hpCYow==
FLI+c3clp1BNDjVAfvC2Dnw=
t21Erq8/r09wAzAJTAH3Ng==
VAg3gU1KH9uW3YIPAgc=
Gjlc09d6qurdLePSLZktDmGA1A==
MMraOD3ve5odaf+03cB3FHGL
mLRTTAycMcrHgomShQHVwfFKkGQaehvF
fpab65mlchvKnNM=
M6jUQU0omipqaUNXyvF6Pg==
S/XrNQGVvwUsSnKFyvF6Pg==
LeC0GeF2zvCosNtMx5RltjCD
Y+IGYC/XHS63wIus5n08ADN2qzanuA==
3tJus7Rc6OtWnx9y4d/a
4uSOYiXhGxumZcTLuA==
5PyP2thOiIucXaWhoQ==
6978Rw3FNTibYVQ1ow8=
3Ah90lcSVCYO0g==
V/UQWRsOOQjDye9m0cLQ
yRXcMfySzTmEhddhqljeGH8=
vWuKFZKZ48E=
8+UEda631IpZ
LUofBqVNdT/v+MXiEWm90Ape3g==
NCi29RHdDYd7hso=
i36jBdNko/HyUKg1eWYgJx9n3A==
vdblMhHYSkgDmBly4d/a
oQmZH6K31IpZ
fCBHqaFGx9OUMMuBr5GWDXXY5DAT
FDXweHcHVCYO0g==
qSQd9bd7BQavQ9NbcUT+O6e4OGsaehvF
vN98englU4HHzqi36ju/91SJ
prTUIBi6MhiXZFQ1ow8=
w008jVXdCYd7hso=
p1kghFnjD9iADog5cVDmvrDiTjk=
xLjHJFYDQL+ysdk=
6tiR9MZa9xSMXVQ1ow8=
WMzXJPGcyIrP2g==
SeI4PsQ+N/O0iMs=
+4o0lKRDsz+RUqpoBvt3FHGL
AHQG4ZsybzCo8ZlBs1jeGH8=
kIgR46ls4wiGUJZLtFjeGH8=
b/fmPTHIRhvKnNM=
lTL5XnA4eKLb4snpHXt2s/MaSVsHBrU=
psOQcAKjHxyFw0vIwrZ3FHGL
F806xNnby5hO
7t72ZXkhmSAc8xLYD4J2XXc=
Ihmk3OR96/2HSbdi
ea/NKy3VVcx7hpCYow==
ifair.ltd
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exedescription pid process target process PID 1720 set thread context of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exepid process 804 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exedescription pid process target process PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe PID 1720 wrote to memory of 804 1720 SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.19493.23000.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/804-56-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/804-57-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/804-59-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/804-60-0x0000000000420330-mapping.dmp
-
memory/804-61-0x0000000000A40000-0x0000000000D43000-memory.dmpFilesize
3.0MB
-
memory/1720-54-0x0000000000280000-0x00000000002E4000-memory.dmpFilesize
400KB
-
memory/1720-55-0x00000000765B1000-0x00000000765B3000-memory.dmpFilesize
8KB