Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe
Resource
win7-20231215-en
General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe
-
Size
280KB
-
MD5
d6803baa9bb7388f379e6286521882db
-
SHA1
63ea3f5558ac9e5ad61fac7710d8301284dace4e
-
SHA256
21bc9284cc3a78d74045780b99fe065c7a5170c5f25b74fd948cb08e8fa90fcf
-
SHA512
4701c743d706f56d7519805f58e5314015d83d75978fdd333c46f6a651876f2f79960b8716a75a0efe8496de85d1cd75abba38dda66bbdc258c9fe14152a38c3
-
SSDEEP
6144:A45RW6ILF3YX78gJaayjOFjG6jPk2MSl:AsRWBE78gJ1yjwrk+
Malware Config
Extracted
stealc
http://5.42.64.41
-
url_path
/40d570f44e84a454.php
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe -
Loads dropped DLL 4 IoCs
pid Process 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4444 2280 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1936 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1152 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe 96 PID 2280 wrote to memory of 1152 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe 96 PID 2280 wrote to memory of 1152 2280 SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe 96 PID 1152 wrote to memory of 1936 1152 cmd.exe 99 PID 1152 wrote to memory of 1936 1152 cmd.exe 99 PID 1152 wrote to memory of 1936 1152 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.31232.1531.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 24562⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2280 -ip 22801⤵PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
669KB
MD5550686c0ee48c386dfcb40199bd076ac
SHA1ee5134da4d3efcb466081fb6197be5e12a5b22ab
SHA256edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
SHA5120b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e
-
Filesize
106KB
MD5dbe4f2209d085b56a9982b79e82e4c66
SHA1d786f87950474157e064446fe348221e552cf38d
SHA2568a6ed1368f0e4efeaaca1324f5ee1fea84a86e178189a4e3ed4786a2ba607e0b
SHA512f4c6bfdb0ac319e9950e2e39d9ddcbcdcb3142a50d9d756c034b04457af192eb2d80d8da3b3db60af192d707779b3630ad5eecc35f4949e83b369f731363fc18
-
Filesize
92KB
MD58297f90b707a4f0eaddb1de819c4206f
SHA16b7cae185d493062e04f515ff33a53af275c1915
SHA256d1529550d4e3a40b478c582c8d9e96d95d73f4b91084ff1dd3221914eb22196a
SHA5120de1bcc849941630e0166e426f57610a1036f06ffa45c21078b3cc5ddfb20acb45c5e0b8912689aaf4545126b1d0498646e267fd716ef6e9b7ddba601f265175
-
Filesize
149KB
MD5b3d4ecdfc85e846ba31dcd7c0460c622
SHA1322a6881189162e8e430ec0f0ab6818bd63b2c21
SHA256df2c9614bc228a4094def506debab3ca7232b3eeaf4f5cf63d2ba3eb3410ca93
SHA51252f6836b1e2c5564aecdc7b427225f83c8c7bcc0c111f9b134adfb50697ffe0147d1834abfb87c31dfb3621b81a7c8fd8625e6859b942e4b5ac7499acf84f603
-
Filesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6