Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/08/2023, 09:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe
Resource
win7-20230712-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe
Resource
win10v2004-20230703-en
6 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe
-
Size
805KB
-
MD5
3973104058c66a17a48710f91ddd1b61
-
SHA1
2fc05ed15b56c7fe41c018279bdc191ea12418ae
-
SHA256
54a5be7cfb6c0e4eb1673fc7d158b93094378a55f403afa84b82604bf06a9d5b
-
SHA512
0dbdf074955e6360a31b3f7a7531b699725013e4dcd116d39c6f26aa3780fe7b44e4cd06560098d8d5539dc91502c77aa1bfff905ae765c103bde6bbd2b4e32c
-
SSDEEP
12288:SiaGR8FC3MwkHQS3ZGsy++cMGNuGAJboeP0GIMDyO5vzw8xy+zlDhyfjA:ig7kHQwZw++cMGFwfP3Dyacr+zthys
Score
10/10
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
mail.parivartansandeshfoundation.com - Port:
587 - Username:
[email protected] - Password:
Man84Book!@#
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sqqat = "C:\\Users\\Admin\\AppData\\Roaming\\Sqqat.exe" SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\EbJgI = "C:\\Users\\Admin\\AppData\\Roaming\\EbJgI\\EbJgI.exe" MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 MSBuild.exe 2664 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe Token: SeDebugPrivilege 2664 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28 PID 2504 wrote to memory of 2664 2504 SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2289.22780.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-