Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 03:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe
Resource
win7-20220901-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe
-
Size
837KB
-
MD5
b185ab1a2b4309a489c658d5231c3ce8
-
SHA1
9e09ef7b618d841ba4fc0cc17d0a76a24acde115
-
SHA256
2106aa8235bc1e05d367bae1e65c50bf8d11c4b4106ceebde0f9307ffcf273c0
-
SHA512
bd15bc8fbbe262e1831b82841992409a8f9667b209fc9bbf257677b74833a71586ca3d516046f29f656709ef9ae822b6998dcb18cdc80de4630776406b9d1c8e
-
SSDEEP
12288:9cNhQ3udD6w4toeYw1Ctn4Na7dBNBNjma3gKZ/nXt7virmWhlGLaQYI:WNhHZ6wG7Yw1Ctn4NCF
Malware Config
Extracted
gozi
Extracted
formbook
bmr1
q05YNsJC4MpYLGAf4A==
6KUzKCvwX0fwzrFQXvlucw==
KA4ZibW1w+hWN5Q=
TfgNq18tIWtsM7h+DexncQ==
zspNqjUKBdJVHTkiMMXJYeF7G53bVvMPoA==
hopQr+b8KzPIbMWvw0Yxir6cyw==
2thmt+17FR/MVsakbM/+w3xGOhopJw==
5gO5gfA6jwna/4FNSPqrvvHyr2A=
kqtr0wr9KaOXVMyDDexncQ==
PNldyz0Boa5cLGAf4A==
Gysor7fqabd0UzTwWp3Zir6cyw==
pMRgV18gtLorB21prX4=
ukpf+vu2u+hWN5Q=
pcS/rO+KmPMj69G9cMHnoSEm59cbIQ==
4fWGzv347bFNDYJeeIHKG5co
WXlRyM2Yn+4Ab1EgRAFHWdGDCzf1
ZPoM+2U1cwMzteOBsHY=
o8jQoNron4sT3A/KomE=
7QX8tTpv/A+YKw==
wFvmV8SY/A+YKw==
95ZJuruBovPziXkgyca4
DMhVqQXTdWLZcWM3IVNtZg==
Fya6G31VF/eHQ+OBsHY=
Q1AMfbPC2yU1IZV9q4C8vvHyr2A=
fRtdZZssSsG3s6Z7
bxBFLS8FnGv/bdOdDdjmfHz9ww==
0YG+jc1b/A+YKw==
lRliT3IEEDJ4ZoZ8a+7meQ==
dI7SuWbu40M=
Z4oXeMBk6sdDMow=
h5BX2BodM4ChJyEJXWhZEIlmBBTw
cYNHnMHSDHNoFn5XDexncQ==
U4uXeMXGel/Yo5F7JWy7ir6cyw==
w30JX9IHAfmEUkjMfJSh
nyYeAHdAO4ibDfK6+QoHkxDjQ0L/
kRNHMSv9qT1YAOi+/YTEubWayQ==
K84SAQbaiIE2JhEBwkI87fHyr2A=
/TfyyBrkRXG3s6Z7
Xm4DxD9z/A+YKw==
Iiod8GDRqTNm
UQavJOBL1PauNg==
5gHqohpY/A+YKw==
p9NjrOfd7y00suOBsHY=
+QwD0hEcmOH9FrqKOoip
t1ynrb95ITDbVcCcYLbyyYAhz/aC86DP
nsJ4j550C9tdGUvpa9jieQ==
2UyPicBXYsG3s6Z7
JcXRsh7oFKPHNx7+VFi2w/Hyr2A=
3AT+4Rqw0TI3s+OBsHY=
0m73TYSQvcdyP7Khu0w87fHyr2A=
0tyaI3KOu9UtnY5MWuNVKWo=
SXV//PAYkeL6tJB6LnC7ir6cyw==
BZ3ZnFfRqTNm
DIiVdbFCcAQd/3FWhBPOSNDjQ0L/
PzqDVoWG2r6rM5N9histir6cyw==
QFxDG5iTNsm3s6Z7
K07iK1LZc1POTrmDDexncQ==
1WJ3D0tnnQICtizlgdNO55Ii
Y3YBWZCixOhWN5Q=
N1AaNH32m3YaLGAf4A==
2wYTDEnS7XWxVTvMfJSh
Um9jMnNrA+BtRUDMfJSh
8eqyDgzQxuhWN5Q=
JbnNV71HXsW3s6Z7
escortsforme.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exedescription pid process target process PID 1340 set thread context of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exepid process 1244 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exedescription pid process target process PID 1340 wrote to memory of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe PID 1340 wrote to memory of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe PID 1340 wrote to memory of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe PID 1340 wrote to memory of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe PID 1340 wrote to memory of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe PID 1340 wrote to memory of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe PID 1340 wrote to memory of 1244 1340 SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.13411.23211.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1244-64-0x00000000004012B0-mapping.dmp
-
memory/1244-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1244-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1244-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1244-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1244-67-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1244-68-0x0000000000B70000-0x0000000000E73000-memory.dmpFilesize
3.0MB
-
memory/1340-55-0x00000000758B1000-0x00000000758B3000-memory.dmpFilesize
8KB
-
memory/1340-56-0x00000000003B0000-0x00000000003C6000-memory.dmpFilesize
88KB
-
memory/1340-57-0x0000000000410000-0x000000000041E000-memory.dmpFilesize
56KB
-
memory/1340-58-0x00000000058C0000-0x000000000593E000-memory.dmpFilesize
504KB
-
memory/1340-59-0x00000000008C0000-0x0000000000904000-memory.dmpFilesize
272KB
-
memory/1340-54-0x0000000000900000-0x00000000009D8000-memory.dmpFilesize
864KB