Analysis
-
max time kernel
174s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 20:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe
-
Size
684KB
-
MD5
0379ae001c1c573492d6691c94d2a540
-
SHA1
f92b3c78bb2170074ae40f92743432ef10d55f06
-
SHA256
7fa778a38b6adbec2ed8ca4e50d2971c4f135c1bf3b7c24a9adb8f86d3ad2ec5
-
SHA512
d1137357639c3c55460cde25047a4f9706c5ab6501b996cff0ffc30468d4f534da9433218d0a7a4b1c7c2badaf3e44e786443c0b9543b0cc7868f19d28257658
-
SSDEEP
12288:Zrl405A0lVmc7QFRj+ppGLVXcw1916s5cIGdbT0POkCU4H011Q+T3l+zj:BplVTE/9KC916s5cIMkCUFqC3wzj
Malware Config
Extracted
formbook
4u5a
Y9HWoINcPu0r7SSSKt4FCmk7
G/E64auYdhRQM4wZW2bcOaY=
bL57APty/StRpW49a+EdxA==
TppryJ0SoslHe8gJFVc=
HXxDShYIEcUJDahdv2nvl5Hlbp4=
EKaq5c6w0nV3WWlEqM4Www==
VM+YjE8XS1OLcH1roYF4zA==
OwK0wxmBGnq2Fg==
B1zy4bulyfY9tj9DK2eIkeYArpTt
Avj5JeA8m9girqfQ4+cZxA==
AOY4dmDFkCdX8HUJMw==
5cQUw3pPMYr07V8=
P7ZsN4/zt63AEw==
FYyVCOpB8Vl//kSkDLPo91Yy
jxwZTBp+5gcsccPxDF+K4bDG2Rpp0A==
iGx9AO58DRhZbXX9
prwVyLkAtlhSU6irmansg8wArpTt
uqa8ZPl+FFObOkdFNg==
tL4OhF22EDaEOkdFNg==
6exH76Z9o7eu/n86vgPE
rJfvmmO0I0KSOkdFNg==
fWeyPQpzFxdBSlPuAlA=
imNhpGXCQjOgCw==
KOLqYk7Qy278+j3g
A4mLyKgkynW7jZZt0F8=
380eDrCm3ApZbXX9
1k6VTs/04X8=
6yQgD+RiKrbnhr77i60lI/gyAQ==
rST4Evf891bSukI=
wYh6yzBy3wDSOkdFNg==
i0j/88JPuMOz
1t8w27cIepbAIqSh0G5dsiUnCw==
uI6hQB6EIE+bFW1woYF4zA==
BPL0Pin+82dmW/OhB0Fr5JHlbp4=
XC5/ZktMXzEnk+xGrPFSE+st
srT4c1/AacoX8F0=
zJeU2qIZ2VCSOkdFNg==
j4a8RbuBvuFZbXX9
asVC+9b7w7eu
L6UfqgNtQjOgCw==
yTgIJt0+qNUilvojOWqqBypDFg==
Ie006MzYHidZbXX9
fbVjId1kpfdZbXX9
w7z+dzqeJEZq2/A6vgPE
bkyOQjI+MYr07V8=
EODzbkTAOSJZbXX9
sZXWleMz4n7HrUI=
YuK38tZjKZ3eQJnC3jxvdM7D2Rpp0A==
VTJSAfJU7tISaHT/
d/gIXE8qLIr07V8=
F3XypWdIKor07V8=
uQaJTBhc8R4kr/I6vgPE
1T8ENSkKJLudaZZt0F8=
uc4eyKuvBidZbXX9
txCp1rM0oc4LhQHpKYJQUKKktIT3GWoNJw==
RMLQh/ZpQjOgCw==
0+Qt17zBCyNZbXX9
JC6jMCHmB77Eu/EFdap62w==
t4XGRQqC3kSB9Tpds2j0Wrg=
T7hCMhTkzX2mf4lVAQjjJOgz
DQ6VYEicGU+NFio7Lw==
PCpjzoTZU3Ol9T1coYF4zA==
DxVl5Jum/t5orqfQ4+cZxA==
OaM0F9KunPxoQUk/Nw==
needook.com
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
cmstp.exeflow pid process 7 292 cmstp.exe -
Loads dropped DLL 1 IoCs
Processes:
cmstp.exepid process 292 cmstp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exeCaspol.execmstp.exedescription pid process target process PID 1792 set thread context of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 472 set thread context of 1228 472 Caspol.exe Explorer.EXE PID 292 set thread context of 1228 292 cmstp.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
cmstp.exedescription ioc process Key created \Registry\User\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exeCaspol.execmstp.exepid process 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe 472 Caspol.exe 472 Caspol.exe 472 Caspol.exe 472 Caspol.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
Caspol.execmstp.exepid process 472 Caspol.exe 472 Caspol.exe 472 Caspol.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe 292 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exeCaspol.execmstp.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Token: SeDebugPrivilege 472 Caspol.exe Token: SeDebugPrivilege 292 cmstp.exe Token: SeShutdownPrivilege 1228 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exeExplorer.EXEcmstp.exedescription pid process target process PID 1792 wrote to memory of 700 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 700 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 700 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 700 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1792 wrote to memory of 472 1792 SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe Caspol.exe PID 1228 wrote to memory of 292 1228 Explorer.EXE cmstp.exe PID 1228 wrote to memory of 292 1228 Explorer.EXE cmstp.exe PID 1228 wrote to memory of 292 1228 Explorer.EXE cmstp.exe PID 1228 wrote to memory of 292 1228 Explorer.EXE cmstp.exe PID 1228 wrote to memory of 292 1228 Explorer.EXE cmstp.exe PID 1228 wrote to memory of 292 1228 Explorer.EXE cmstp.exe PID 1228 wrote to memory of 292 1228 Explorer.EXE cmstp.exe PID 292 wrote to memory of 1752 292 cmstp.exe Firefox.exe PID 292 wrote to memory of 1752 292 cmstp.exe Firefox.exe PID 292 wrote to memory of 1752 292 cmstp.exe Firefox.exe PID 292 wrote to memory of 1752 292 cmstp.exe Firefox.exe PID 292 wrote to memory of 1752 292 cmstp.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"3⤵PID:700
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:472 -
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:596
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:320
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1696
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2044
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:708
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1756
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1740
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1496
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1444
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:540
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1820
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1012
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\sqlite3.dllFilesize
927KB
MD57fd80b1cc72dc580c02ca4cfbfb2592d
SHA118da905af878b27151b359cf1a7d0a650764e8a1
SHA2561e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190
SHA51213f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3
-
memory/292-68-0x0000000000000000-mapping.dmp
-
memory/292-75-0x00000000000B0000-0x00000000000DD000-memory.dmpFilesize
180KB
-
memory/292-73-0x0000000001D90000-0x0000000001E1F000-memory.dmpFilesize
572KB
-
memory/292-72-0x0000000001FD0000-0x00000000022D3000-memory.dmpFilesize
3.0MB
-
memory/292-71-0x00000000000B0000-0x00000000000DD000-memory.dmpFilesize
180KB
-
memory/292-70-0x0000000000050000-0x0000000000068000-memory.dmpFilesize
96KB
-
memory/292-69-0x0000000076381000-0x0000000076383000-memory.dmpFilesize
8KB
-
memory/472-60-0x00000000004012B0-mapping.dmp
-
memory/472-56-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/472-66-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/472-57-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/472-64-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/472-63-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/472-62-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/472-65-0x00000000009E0000-0x0000000000CE3000-memory.dmpFilesize
3.0MB
-
memory/472-59-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1228-74-0x0000000005070000-0x00000000051DE000-memory.dmpFilesize
1.4MB
-
memory/1228-67-0x0000000004C40000-0x0000000004D64000-memory.dmpFilesize
1.1MB
-
memory/1228-76-0x0000000005070000-0x00000000051DE000-memory.dmpFilesize
1.4MB
-
memory/1792-54-0x0000000000EB0000-0x0000000000F62000-memory.dmpFilesize
712KB
-
memory/1792-55-0x00000000005D0000-0x00000000005DA000-memory.dmpFilesize
40KB