Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 16:34
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe
Resource
win7-20230831-en
General
-
Target
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe
-
Size
6.9MB
-
MD5
56c197e493f74f9233a16cdefab3109f
-
SHA1
af35bd2fd5d884bdf6bea8aac695e98f5a00715a
-
SHA256
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01
-
SHA512
d2830cfebfaa859f5fca15e3c81799e99c3cb31f72b1075d8828f03a490bfe6196b34d35bbcaede32a6d63d5c2d9bc17bea009e1bd8787cb4397f6627328b086
-
SSDEEP
98304:ULop5mhzd71cBjG9Azp56BV8cM0AnwGSOnTXsYGeCW1zbiG54WeOVEMMRHGV7E:0op5mqU9KE8nNZnTXaexbZWsMGV7E
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe -
Processes:
resource yara_rule behavioral2/memory/4968-1-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/4968-2-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/4968-5-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/3292-8-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/3292-7-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/3292-11-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/3472-14-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/3472-13-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect behavioral2/memory/3472-17-0x0000000000020000-0x0000000000A90000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exeSecuriteInfo.com.Win32.BotX-gen.30049.24820.exeSecuriteInfo.com.Win32.BotX-gen.30049.24820.exepid Process 4968 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 4968 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 3292 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 3292 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 3472 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 3472 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exedescription pid Process procid_target PID 4968 wrote to memory of 4604 4968 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 85 PID 4968 wrote to memory of 4604 4968 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 85 PID 4968 wrote to memory of 4604 4968 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe /TR "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe" /F2⤵
- Creates scheduled task(s)
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472