Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 16:47

General

  • Target

    SecuriteInfo.com.Win32.DropperX-gen.16140.24571.exe

  • Size

    1.9MB

  • MD5

    1211d0d152c62ccfa12aa70242fea748

  • SHA1

    eaef6cd943cefd9a06343f8f94fcb1adc5728cb5

  • SHA256

    205123268468fd206ef6cea6a05247bb216714b7973f922bde71141ef8c7e96d

  • SHA512

    331f31ff3337f6ea2c80ee4fd9ea69a70c864dc004bcbc7fe531d481ac114657825ccafc275803caa8b1d4361f9d4df8163af1fd38d0db894ce2e3144629dcf6

  • SSDEEP

    49152:xWhlkLBfJXAEXPpxvTvD54ryFrKvygbi5sKvaEKAmC0eJNPhsE7I+wA:xWhl0BfKEBx7vDhG6HDvBKveNZRM+n

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16140.24571.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.16140.24571.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -U /S S74W.fJ
      2⤵
      • Loads dropped DLL
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\S74W.fJ

    Filesize

    1.4MB

    MD5

    03dbf548c3aaa9272b20d02eb6aabc3a

    SHA1

    46774dcc253342eb0bf48ffffab6efcf93e238d0

    SHA256

    6ca48824f401a101311d99266c57e6a7ad9793553bd5e034305cde878f9a6b3e

    SHA512

    c095352d935e8d8e39d8bde32c6bf7b4c776b64e16457e6a3af78a4fd5009d49b66711bef70dabfd07ad0253e748632208534702800f69edc67614f04c715575

  • C:\Users\Admin\AppData\Local\Temp\S74W.fJ

    Filesize

    1.4MB

    MD5

    03dbf548c3aaa9272b20d02eb6aabc3a

    SHA1

    46774dcc253342eb0bf48ffffab6efcf93e238d0

    SHA256

    6ca48824f401a101311d99266c57e6a7ad9793553bd5e034305cde878f9a6b3e

    SHA512

    c095352d935e8d8e39d8bde32c6bf7b4c776b64e16457e6a3af78a4fd5009d49b66711bef70dabfd07ad0253e748632208534702800f69edc67614f04c715575

  • memory/2696-4-0x0000000000770000-0x0000000000776000-memory.dmp

    Filesize

    24KB

  • memory/2696-5-0x0000000010000000-0x0000000010165000-memory.dmp

    Filesize

    1.4MB

  • memory/2696-7-0x00000000009C0000-0x0000000000ABC000-memory.dmp

    Filesize

    1008KB

  • memory/2696-8-0x0000000010000000-0x0000000010165000-memory.dmp

    Filesize

    1.4MB

  • memory/2696-9-0x0000000002670000-0x0000000002753000-memory.dmp

    Filesize

    908KB

  • memory/2696-12-0x0000000002670000-0x0000000002753000-memory.dmp

    Filesize

    908KB

  • memory/2696-13-0x0000000002670000-0x0000000002753000-memory.dmp

    Filesize

    908KB