Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 19:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe
Resource
win7-20230621-en
3 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe
-
Size
12.1MB
-
MD5
0ef4e3af8936e03be74afa2395286301
-
SHA1
273dd0dde838b7878b2870c8a4e2f1fb0d91e6fd
-
SHA256
5bf3863bd0b4af59a4cdf9b9080b60c827cc19e368beae60ea3930adf12ddec0
-
SHA512
6938a111a124bc82d8d0576dc7769170974575ba2c545c53424a7285e6da242dc39f722920adfba88c472ba88313b6e0d682183a6fdb15df1ba98f5cf723c79a
-
SSDEEP
393216:nzbN0o5te8ZBAVVrXcC73WQGb7wWHeigBlRaJFLQM:nzhFlBAVVrXcCybM3gLQ
Malware Config
Signatures
-
DarkVNC payload 2 IoCs
resource yara_rule behavioral2/memory/4168-1474-0x0000000000400000-0x0000000000488000-memory.dmp darkvnc behavioral2/memory/4108-1476-0x0000000000170000-0x0000000000239000-memory.dmp darkvnc -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5016 set thread context of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 4168 set thread context of 4108 4168 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 90 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4168 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 5016 wrote to memory of 4168 5016 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 89 PID 4168 wrote to memory of 4108 4168 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 90 PID 4168 wrote to memory of 4108 4168 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 90 PID 4168 wrote to memory of 4108 4168 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 90 PID 4168 wrote to memory of 4108 4168 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 90 PID 4168 wrote to memory of 4108 4168 SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.28420.31272.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:4108
-
-