Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 10:43

General

  • Target

    SecuriteInfo.com.Win32.DropperX-gen.12931.exe

  • Size

    868KB

  • MD5

    87c3f6df9996ca5f18e8be80752869e9

  • SHA1

    1e7ead25ebdc2a160d88236f1f960e2a04ed5062

  • SHA256

    e609d6572bfe3240dd66acfc2ce1adf8632b308e476a7b10fad1ea5b30bd3ea6

  • SHA512

    d867c611a9adec0ef4f33308b24ce7490578064f1aec2c6268d2e4671147b339745e2976ccf33fc0400393e7a9af0d7f62607bda58738600a1160a8c11878743

  • SSDEEP

    12288:QrL2b+CUpknn4u/yZmEA4tApMKyJiFEB+SRv7AbHtgi+888888888888W888888M:Z+CAknnP/y8EA8qM9B+SRvMb2i

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.12931.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.12931.exe"
    1⤵
      PID:3016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 224
        2⤵
        • Program crash
        PID:1428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3016 -ip 3016
      1⤵
        PID:3848
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:3556
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2740

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

          Filesize

          16KB

          MD5

          cfc0f50c2d83d2246928026316e7926a

          SHA1

          8e30ba302f2ace42f5687efcbbc6ad954be61f6b

          SHA256

          346bacaf5aceb0adf349045ad379dc245993d425992e8aab28922d77d3024ca8

          SHA512

          222cc9f26af5e9da5162797950d9535125bfbfa0a21ff883d308cfea5947b6eac3c0742f39c03625e93c3d74ac7fdba1f6e941f7444fb69500c7990f71ff0865

        • memory/2740-40-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-42-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-33-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-34-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-35-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-36-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-37-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-38-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-39-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-43-0x000001EE7FC00000-0x000001EE7FC01000-memory.dmp

          Filesize

          4KB

        • memory/2740-32-0x000001EE7FFB0000-0x000001EE7FFB1000-memory.dmp

          Filesize

          4KB

        • memory/2740-41-0x000001EE7FFE0000-0x000001EE7FFE1000-memory.dmp

          Filesize

          4KB

        • memory/2740-0-0x000001EE77940000-0x000001EE77950000-memory.dmp

          Filesize

          64KB

        • memory/2740-44-0x000001EE7FBF0000-0x000001EE7FBF1000-memory.dmp

          Filesize

          4KB

        • memory/2740-46-0x000001EE7FC00000-0x000001EE7FC01000-memory.dmp

          Filesize

          4KB

        • memory/2740-49-0x000001EE7FBF0000-0x000001EE7FBF1000-memory.dmp

          Filesize

          4KB

        • memory/2740-52-0x000001EE773F0000-0x000001EE773F1000-memory.dmp

          Filesize

          4KB

        • memory/2740-16-0x000001EE77A40000-0x000001EE77A50000-memory.dmp

          Filesize

          64KB

        • memory/2740-64-0x000001EE7FD30000-0x000001EE7FD31000-memory.dmp

          Filesize

          4KB

        • memory/2740-66-0x000001EE7FD40000-0x000001EE7FD41000-memory.dmp

          Filesize

          4KB

        • memory/2740-67-0x000001EE7FD40000-0x000001EE7FD41000-memory.dmp

          Filesize

          4KB

        • memory/2740-68-0x000001EE7FE50000-0x000001EE7FE51000-memory.dmp

          Filesize

          4KB