Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2023 07:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SecuriteInfocomWin32Dropp.exe
Resource
win7-20230621-en
windows7-x64
3 signatures
150 seconds
General
-
Target
SecuriteInfocomWin32Dropp.exe
-
Size
12.1MB
-
MD5
0ef4e3af8936e03be74afa2395286301
-
SHA1
273dd0dde838b7878b2870c8a4e2f1fb0d91e6fd
-
SHA256
5bf3863bd0b4af59a4cdf9b9080b60c827cc19e368beae60ea3930adf12ddec0
-
SHA512
6938a111a124bc82d8d0576dc7769170974575ba2c545c53424a7285e6da242dc39f722920adfba88c472ba88313b6e0d682183a6fdb15df1ba98f5cf723c79a
-
SSDEEP
393216:nzbN0o5te8ZBAVVrXcC73WQGb7wWHeigBlRaJFLQM:nzhFlBAVVrXcCybM3gLQ
Malware Config
Signatures
-
DarkVNC payload 3 IoCs
resource yara_rule behavioral2/memory/1120-1465-0x0000000000400000-0x0000000000488000-memory.dmp darkvnc behavioral2/memory/1120-1475-0x0000000000400000-0x0000000000488000-memory.dmp darkvnc behavioral2/memory/4908-1477-0x00000000000D0000-0x0000000000199000-memory.dmp darkvnc -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3588 set thread context of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 1120 set thread context of 4908 1120 SecuriteInfocomWin32Dropp.exe 94 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3588 SecuriteInfocomWin32Dropp.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1120 SecuriteInfocomWin32Dropp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3588 SecuriteInfocomWin32Dropp.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 3588 wrote to memory of 1120 3588 SecuriteInfocomWin32Dropp.exe 93 PID 1120 wrote to memory of 4908 1120 SecuriteInfocomWin32Dropp.exe 94 PID 1120 wrote to memory of 4908 1120 SecuriteInfocomWin32Dropp.exe 94 PID 1120 wrote to memory of 4908 1120 SecuriteInfocomWin32Dropp.exe 94 PID 1120 wrote to memory of 4908 1120 SecuriteInfocomWin32Dropp.exe 94 PID 1120 wrote to memory of 4908 1120 SecuriteInfocomWin32Dropp.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfocomWin32Dropp.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfocomWin32Dropp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfocomWin32Dropp.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfocomWin32Dropp.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:4908
-
-