Analysis
-
max time kernel
180s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.1731.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.1731.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.1731.exe
-
Size
1.5MB
-
MD5
e03f3b47c6d571d7638d3ad73250c959
-
SHA1
5171e195c7f98f39cf2a8be99455d31c1db20281
-
SHA256
92fc579cf2e7c705d2d4140228805f9254449ed058c8d909eac38c9e71d3e532
-
SHA512
358bdd679fdd590cf68148610bb28f70e840df7b69333bd4e58f3b05e6aec3d1aaf49de47630cb9a087787c605e6d7d8225e97739019e36759ae156aa29837c9
-
SSDEEP
24576:pYo90dNh/HQ8B3axWSyU0ZYFAqyX8OQgJtjBuMZB3d2CRNt:pX9INh/HQ8haxWSybZ1sOtj1ZB3d2CRD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4632 btref.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rety6576tfh = "C:\\Users\\Admin\\AppData\\Local\\btref.exe" reg.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4760 PING.EXE 4204 PING.EXE 1284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 4632 btref.exe 4632 btref.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe Token: SeDebugPrivilege 4632 btref.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4212 wrote to memory of 3624 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 96 PID 4212 wrote to memory of 3624 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 96 PID 4212 wrote to memory of 3624 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 96 PID 3624 wrote to memory of 4760 3624 cmd.exe 98 PID 3624 wrote to memory of 4760 3624 cmd.exe 98 PID 3624 wrote to memory of 4760 3624 cmd.exe 98 PID 4212 wrote to memory of 4532 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 100 PID 4212 wrote to memory of 4532 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 100 PID 4212 wrote to memory of 4532 4212 SecuriteInfo.com.Win32.PWSX-gen.1731.exe 100 PID 4532 wrote to memory of 4204 4532 cmd.exe 102 PID 4532 wrote to memory of 4204 4532 cmd.exe 102 PID 4532 wrote to memory of 4204 4532 cmd.exe 102 PID 3624 wrote to memory of 4220 3624 cmd.exe 103 PID 3624 wrote to memory of 4220 3624 cmd.exe 103 PID 3624 wrote to memory of 4220 3624 cmd.exe 103 PID 4532 wrote to memory of 1284 4532 cmd.exe 105 PID 4532 wrote to memory of 1284 4532 cmd.exe 105 PID 4532 wrote to memory of 1284 4532 cmd.exe 105 PID 4532 wrote to memory of 4632 4532 cmd.exe 112 PID 4532 wrote to memory of 4632 4532 cmd.exe 112 PID 4532 wrote to memory of 4632 4532 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1731.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1731.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 35 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "rety6576tfh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\btref.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 353⤵
- Runs ping.exe
PID:4760
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "rety6576tfh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\btref.exe"3⤵
- Adds Run key to start application
PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 38 > nul && copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1731.exe" "C:\Users\Admin\AppData\Local\btref.exe" && ping 127.0.0.1 -n 38 > nul && "C:\Users\Admin\AppData\Local\btref.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 383⤵
- Runs ping.exe
PID:4204
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 383⤵
- Runs ping.exe
PID:1284
-
-
C:\Users\Admin\AppData\Local\btref.exe"C:\Users\Admin\AppData\Local\btref.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5e03f3b47c6d571d7638d3ad73250c959
SHA15171e195c7f98f39cf2a8be99455d31c1db20281
SHA25692fc579cf2e7c705d2d4140228805f9254449ed058c8d909eac38c9e71d3e532
SHA512358bdd679fdd590cf68148610bb28f70e840df7b69333bd4e58f3b05e6aec3d1aaf49de47630cb9a087787c605e6d7d8225e97739019e36759ae156aa29837c9
-
Filesize
1.5MB
MD5e03f3b47c6d571d7638d3ad73250c959
SHA15171e195c7f98f39cf2a8be99455d31c1db20281
SHA25692fc579cf2e7c705d2d4140228805f9254449ed058c8d909eac38c9e71d3e532
SHA512358bdd679fdd590cf68148610bb28f70e840df7b69333bd4e58f3b05e6aec3d1aaf49de47630cb9a087787c605e6d7d8225e97739019e36759ae156aa29837c9