Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20-09-2023 10:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe
-
Size
63KB
-
MD5
cd47b64e420b472464001891ff312ff6
-
SHA1
e39162573378dd9233495ff0a6ac0542de039efb
-
SHA256
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df
-
SHA512
09471e053cc40cb83dab4c000b0f2f26abb16e420db325c1ee11288a9a181123fb37d458c406dbfb603795b84bceca6fff908e2d7c360eb6ee61959330326467
-
SSDEEP
768:UCEWXVsHowBr6/ulopYqfAvMeRMxhtiG/joxvxkOVvw3kJ28eG5x5+8ZiHwkgcGJ:UCfOH8GlSK4ZigjonNJ42ZiQkVI
Malware Config
Signatures
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exedescription pid Process procid_target PID 1888 set thread context of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exeSecuriteInfo.com.Win32.DropperX-gen.16843.25908.exepid Process 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 2636 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exedescription pid Process Token: SeDebugPrivilege 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exedescription pid Process procid_target PID 1888 wrote to memory of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28 PID 1888 wrote to memory of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28 PID 1888 wrote to memory of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28 PID 1888 wrote to memory of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28 PID 1888 wrote to memory of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28 PID 1888 wrote to memory of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28 PID 1888 wrote to memory of 2636 1888 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-