Analysis

  • max time kernel
    180s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 00:49

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.1731.exe

  • Size

    1.5MB

  • MD5

    e03f3b47c6d571d7638d3ad73250c959

  • SHA1

    5171e195c7f98f39cf2a8be99455d31c1db20281

  • SHA256

    92fc579cf2e7c705d2d4140228805f9254449ed058c8d909eac38c9e71d3e532

  • SHA512

    358bdd679fdd590cf68148610bb28f70e840df7b69333bd4e58f3b05e6aec3d1aaf49de47630cb9a087787c605e6d7d8225e97739019e36759ae156aa29837c9

  • SSDEEP

    24576:pYo90dNh/HQ8B3axWSyU0ZYFAqyX8OQgJtjBuMZB3d2CRNt:pX9INh/HQ8haxWSybZ1sOtj1ZB3d2CRD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1731.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1731.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 35 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "rety6576tfh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\btref.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 35
        3⤵
        • Runs ping.exe
        PID:4760
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "rety6576tfh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\btref.exe"
        3⤵
        • Adds Run key to start application
        PID:4220
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 38 > nul && copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1731.exe" "C:\Users\Admin\AppData\Local\btref.exe" && ping 127.0.0.1 -n 38 > nul && "C:\Users\Admin\AppData\Local\btref.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 38
        3⤵
        • Runs ping.exe
        PID:4204
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 38
        3⤵
        • Runs ping.exe
        PID:1284
      • C:\Users\Admin\AppData\Local\btref.exe
        "C:\Users\Admin\AppData\Local\btref.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\btref.exe

    Filesize

    1.5MB

    MD5

    e03f3b47c6d571d7638d3ad73250c959

    SHA1

    5171e195c7f98f39cf2a8be99455d31c1db20281

    SHA256

    92fc579cf2e7c705d2d4140228805f9254449ed058c8d909eac38c9e71d3e532

    SHA512

    358bdd679fdd590cf68148610bb28f70e840df7b69333bd4e58f3b05e6aec3d1aaf49de47630cb9a087787c605e6d7d8225e97739019e36759ae156aa29837c9

  • C:\Users\Admin\AppData\Local\btref.exe

    Filesize

    1.5MB

    MD5

    e03f3b47c6d571d7638d3ad73250c959

    SHA1

    5171e195c7f98f39cf2a8be99455d31c1db20281

    SHA256

    92fc579cf2e7c705d2d4140228805f9254449ed058c8d909eac38c9e71d3e532

    SHA512

    358bdd679fdd590cf68148610bb28f70e840df7b69333bd4e58f3b05e6aec3d1aaf49de47630cb9a087787c605e6d7d8225e97739019e36759ae156aa29837c9

  • memory/4212-8-0x00000000751C0000-0x0000000075970000-memory.dmp

    Filesize

    7.7MB

  • memory/4212-9-0x0000000005AD0000-0x0000000005AE0000-memory.dmp

    Filesize

    64KB

  • memory/4212-4-0x0000000005AD0000-0x0000000005AE0000-memory.dmp

    Filesize

    64KB

  • memory/4212-5-0x0000000005910000-0x000000000591A000-memory.dmp

    Filesize

    40KB

  • memory/4212-6-0x0000000006B70000-0x0000000006C0C000-memory.dmp

    Filesize

    624KB

  • memory/4212-7-0x0000000008730000-0x0000000008772000-memory.dmp

    Filesize

    264KB

  • memory/4212-0-0x0000000000A60000-0x0000000000BE0000-memory.dmp

    Filesize

    1.5MB

  • memory/4212-3-0x0000000005870000-0x0000000005902000-memory.dmp

    Filesize

    584KB

  • memory/4212-10-0x0000000005AD0000-0x0000000005AE0000-memory.dmp

    Filesize

    64KB

  • memory/4212-11-0x0000000005AD0000-0x0000000005AE0000-memory.dmp

    Filesize

    64KB

  • memory/4212-13-0x00000000751C0000-0x0000000075970000-memory.dmp

    Filesize

    7.7MB

  • memory/4212-2-0x0000000005F20000-0x00000000064C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4212-1-0x00000000751C0000-0x0000000075970000-memory.dmp

    Filesize

    7.7MB

  • memory/4632-19-0x0000000000990000-0x0000000000B10000-memory.dmp

    Filesize

    1.5MB

  • memory/4632-20-0x0000000075190000-0x0000000075940000-memory.dmp

    Filesize

    7.7MB

  • memory/4632-21-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB