Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe
Resource
win7-20220901-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe
-
Size
830KB
-
MD5
117d8fe530f41f5eb068b27480377234
-
SHA1
c61eb8e55dbaa0aaacddec463b39d6ef00cc3566
-
SHA256
0ce95ed2a26eb4e5f38cd27cbcac2065b3e6a71a26cdc24f56946dd0428f88be
-
SHA512
41a273e191f66b22cc3b86115b867df8fdf2721c5d5ffa3c4ec73f1bf91c5eb575ffecbf0ddd6fa5de817b4d63eb7f788a49e284780e04f14b8788b02486625f
-
SSDEEP
12288:Bc6sfZ344iymiLkOPQJzCcAipT+oXuKDz7AWPz5jjmahgKZ/nXt7virmWhlGLaQ1:S6sfe4iymiNPm2cepKDz7vPl
Malware Config
Extracted
formbook
4.1
f9r5
teknotimur.com
zuliboo.com
remmingtoncampbell.com
vehicletitleloansphoenix.com
sen-computer.com
98731.biz
shelikesblu.com
canis-totem.com
metaversemedianetwork.com
adsdu.com
vanishmediasystems.com
astewaykebede.com
wszhongxue.com
gacha-animator-free.com
papatyadekorasyon.com
mqc168.top
simplebrilliantsolutions.com
jubileehawkesprairie.com
ridflab.com
conboysfilm.com
iseemerit.world
airhbb.com
haveyourshare.com
qcstcsz.com
attorneykarinaramirez.com
patriziabartelle.com
dcc.coop
hdzz.top
treesandstarsoracle.com
rebarunikont.com
achivego.site
baipiao100.com
menslibwrty.com
insulationtraining.online
horseflix.club
suxyqyu.xyz
sqoki.com
ffbsjhvbsjhbvsajv.xyz
beapest.cfd
4892166.com
dvdmediastar.com
hotwomensearching4u.site
cupompetlover.com
terrapretasales.com
joinsequene.com
powerkitap.com
jonjene.com
wqcwgl.com
utahexotics.com
ballerboutique.com
cftronline.com
gettidaladvance.site
anagladstonedesign.com
bunsi-figura.store
ttvip-13.net
cmjysx-uqps.website
ifealafia.com
carlospainter.com
elitetrio.xyz
inggridangelia.com
leporebaq.com
youpinhang.com
palm3d.net
wo567567.com
shinecleaningasheville.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2072-146-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4968 set thread context of 2072 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 3632 powershell.exe 2072 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 2072 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 3632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe Token: SeDebugPrivilege 3632 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4968 wrote to memory of 3632 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 84 PID 4968 wrote to memory of 3632 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 84 PID 4968 wrote to memory of 3632 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 84 PID 4968 wrote to memory of 3488 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 86 PID 4968 wrote to memory of 3488 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 86 PID 4968 wrote to memory of 3488 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 86 PID 4968 wrote to memory of 4148 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 88 PID 4968 wrote to memory of 4148 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 88 PID 4968 wrote to memory of 4148 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 88 PID 4968 wrote to memory of 2716 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 89 PID 4968 wrote to memory of 2716 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 89 PID 4968 wrote to memory of 2716 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 89 PID 4968 wrote to memory of 2008 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 90 PID 4968 wrote to memory of 2008 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 90 PID 4968 wrote to memory of 2008 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 90 PID 4968 wrote to memory of 2072 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 91 PID 4968 wrote to memory of 2072 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 91 PID 4968 wrote to memory of 2072 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 91 PID 4968 wrote to memory of 2072 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 91 PID 4968 wrote to memory of 2072 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 91 PID 4968 wrote to memory of 2072 4968 SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UPpiXkLqi.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UPpiXkLqi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2A8A.tmp"2⤵
- Creates scheduled task(s)
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"2⤵PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"2⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"2⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.16696.22525.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56f8ee62594f2e8882140f8a8be17606d
SHA16ad0b099988cb844817ab0b07db689cd005e7670
SHA256d67c523f2fd30dbec4c33254b5e7e3d573d823a00e89f8360b522aa62c670436
SHA512634fb26f7d25640b721f34210cd9d6046b64172b2ef7c6375f4d07c0a60d7f64fca012073ef926c05467ade4e5e318e2d60c3365aed208011196bb472391c10c