Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 10:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe
-
Size
63KB
-
MD5
cd47b64e420b472464001891ff312ff6
-
SHA1
e39162573378dd9233495ff0a6ac0542de039efb
-
SHA256
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df
-
SHA512
09471e053cc40cb83dab4c000b0f2f26abb16e420db325c1ee11288a9a181123fb37d458c406dbfb603795b84bceca6fff908e2d7c360eb6ee61959330326467
-
SSDEEP
768:UCEWXVsHowBr6/ulopYqfAvMeRMxhtiG/joxvxkOVvw3kJ28eG5x5+8ZiHwkgcGJ:UCfOH8GlSK4ZigjonNJ42ZiQkVI
Malware Config
Signatures
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exedescription pid process target process PID 4688 set thread context of 5000 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exeSecuriteInfo.com.Win32.DropperX-gen.16843.25908.exepid process 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 5000 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe 5000 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exedescription pid process Token: SeDebugPrivilege 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exedescription pid process target process PID 4688 wrote to memory of 5000 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe PID 4688 wrote to memory of 5000 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe PID 4688 wrote to memory of 5000 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe PID 4688 wrote to memory of 5000 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe PID 4688 wrote to memory of 5000 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe PID 4688 wrote to memory of 5000 4688 SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16843.25908.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-