Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2023, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe
Resource
win7-20230220-en
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe
-
Size
3.8MB
-
MD5
59f7602b250387b31bfc481f3efb9517
-
SHA1
0595cef0fca0e8c941a4d7b09a4ac8a50c7e0080
-
SHA256
49771182f73d733abe396700d5f30b1f0b29f94044b0c8158a5c3a4564305523
-
SHA512
70eb26be17e653b60e287334c26118e4ef7c5a5f2c92fd3b5a6b1178ca4c1a9bc8ecd4662958fb335de2e4f12f618efebe8aabe9448989d00747b723879dadee
-
SSDEEP
49152:deFHZuHw5+sQ/A+g+aOxadb6wq0RxyU24hkpBFwzpJKl4OLHMqEPeYc70Kjvw0:deMa+RsL5VxObM/Kjvw0
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 3604 4712 WerFault.exe 84 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 powershell.exe 4812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4812 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4712 wrote to memory of 4812 4712 SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe 85 PID 4712 wrote to memory of 4812 4712 SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe 85 PID 4712 wrote to memory of 3644 4712 SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe 87 PID 4712 wrote to memory of 3644 4712 SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe 87 PID 3644 wrote to memory of 4848 3644 cmd.exe 89 PID 3644 wrote to memory of 4848 3644 cmd.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.66410738.28815.28750.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "schtasks /Create /TR C:\Users\Admin\AppData\Local\Temp\\system /SC ONLOGON /TN system /IT"2⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\system32\schtasks.exeschtasks /Create /TR C:\Users\Admin\AppData\Local\Temp\\system /SC ONLOGON /TN system /IT3⤵
- Creates scheduled task(s)
PID:4848
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4712 -s 12042⤵
- Program crash
PID:3604
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 428 -p 4712 -ip 47121⤵PID:4164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
4.4MB
MD59a4345532e90daef82476df6cc3f7ee8
SHA15725a76f73e4d4aea8690ba0ae412edbee347afc
SHA256373def2666d68ede7e704d2243cd01ca51a9812a02fb5dcccf85cf209335532b
SHA5123d8f140136467499dae79dc26481193f054042f2fe66c20b0365003b257a1ad76cec9bb93f7ef8bb0a29d50489f370ffe35b18fa963baca47b3008ad6c9af91b
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5c9f27e93d4d2fb6dc5d4d1d2f7d529db
SHA1cc44dd47cabe4d2ebba14361f8b5254064d365d3
SHA256d724f78d92cc963b4a06a12a310c0f5411b1ce42361dcfc498a5759efe9fdd7c
SHA512f7cc478278a5725e18ac8c7ff715fd88798b4562412d354925711c25353277ff2044d3c4a314d76f987006941b35cdde43deb9df4397b37689f67cb8fe541472
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73