Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2024, 16:44

General

  • Target

    SecuriteInfo.com.FileRepMalware.17500.exe

  • Size

    546KB

  • MD5

    5e79d7640c021dc7c8e18d25c4985f69

  • SHA1

    0d6e64814944ca0f29937edb2ff2f7cd4a506794

  • SHA256

    fe658bfa35746debb348dbcea5f6d93d22df9211ca340ac21f756a955a9be481

  • SHA512

    89ff2eccf9af148ea73d737669796945d523c0569c1ce2f248dc759bcb02d67023811308bb41aff14e3c8429f52dc29d89ead688446d282c5091a3e9df442638

  • SSDEEP

    12288:yubj5je69oqAmj5oMqKyKAuqOAP0wuTeMb01JQntLOCIXo0H:yqhe29AmjkKuuTemIXx

Score
1/10

Malware Config

Signatures

  • Modifies registry class 21 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.17500.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.17500.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Deployment\3BYA1H3G.TPV\T64LG3J5.L31.application

    Filesize

    12KB

    MD5

    582bace4b0d5f20e194103cd2e6e273b

    SHA1

    640c4dc6948bf65ed25cb9540387c08ebe6a4e70

    SHA256

    12fe9fa538de1027e006ca7dd4916013d823a6d9207bd189dac78d9f3a97b506

    SHA512

    d096ec8fe35c1f6d493ef7ecb69b94f8a518b45ef6e2b183a11712167c064817bd54d58a3cefa1c106ac54d4592dc6de80e71c99f66b14ce0578d9b37f98b586

  • memory/576-19-0x0000000000390000-0x0000000000398000-memory.dmp

    Filesize

    32KB

  • memory/576-20-0x000007FEF5470000-0x000007FEF5E5C000-memory.dmp

    Filesize

    9.9MB

  • memory/576-22-0x000000001B080000-0x000000001B100000-memory.dmp

    Filesize

    512KB

  • memory/576-24-0x000000001B080000-0x000000001B100000-memory.dmp

    Filesize

    512KB

  • memory/576-23-0x000000001B080000-0x000000001B100000-memory.dmp

    Filesize

    512KB

  • memory/576-36-0x000007FEF5470000-0x000007FEF5E5C000-memory.dmp

    Filesize

    9.9MB

  • memory/576-37-0x000000001B080000-0x000000001B100000-memory.dmp

    Filesize

    512KB