Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe
Resource
win7-20231020-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe
-
Size
275KB
-
MD5
dda4fb7debe83135087e6e1965982cff
-
SHA1
1f5046d4f5ef48a414ec8b3f0e6bd852535fb5ca
-
SHA256
1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d
-
SHA512
897d7b62af3786b74be87908b3c4d38b5c901082dcbef9073773cfa765331330750109b3009d149836a748f72c56d265f9576402fa8693befc89678e28b6ac74
-
SSDEEP
3072:BHN0wp7/AcRnTG1ytiiGa9k9Kap7q9lSMCMc0Ml92PtjAVFUpxzS:kkjDnqDasKap7qeM1cD9WtjW0x
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2440 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4836 SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe 4836 SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4048 4836 SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe 91 PID 4836 wrote to memory of 4048 4836 SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe 91 PID 4836 wrote to memory of 4048 4836 SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe 91 PID 4048 wrote to memory of 2440 4048 cmd.exe 95 PID 4048 wrote to memory of 2440 4048 cmd.exe 95 PID 4048 wrote to memory of 2440 4048 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24848.3090.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2440
-
-