Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe
Resource
win10v2004-20240426-en
General
-
Target
SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe
-
Size
5KB
-
MD5
a6edc88e45cdddefc02dcaaa6c0ffc2f
-
SHA1
37ccc25cc0e31a3d26047b13886b2c2072081cc5
-
SHA256
0833c4e8e1125dbc4ec18d3803be63778cf3cb2d1a77c8398f3b380c1c7e25cb
-
SHA512
6a890cb1c1a1e2a2ab87604a64ed4d3e2e922fd5753dea55155e0daf3d469388d9631ba5f8cc5f2cae44f178735029952374bdea480481f14988484f274c05e6
-
SSDEEP
48:6pTlYrITctYG+vLHmCyYfJyMmw9jAUzEVnQBG/RACalGUbw2CS7DD:mBLYtOvLGazZ6wAnQWRRUbw2CqD
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
denis.exepid process 1316 denis.exe -
Executes dropped EXE 1 IoCs
Processes:
denis.exepid process 1316 denis.exe -
Loads dropped DLL 2 IoCs
Processes:
SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exepid process 1284 SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe 1284 SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exedescription pid process target process PID 1284 wrote to memory of 1316 1284 SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe denis.exe PID 1284 wrote to memory of 1316 1284 SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe denis.exe PID 1284 wrote to memory of 1316 1284 SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe denis.exe PID 1284 wrote to memory of 1316 1284 SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe denis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoad3.33216.13863.20878.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\denis.exe"C:\Users\Admin\AppData\Local\Temp\denis.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\1305UKdw[1].htm
Filesize278B
MD59fa1cef991fe6e8541a0c8fb5aa3a5b9
SHA159851a273d54ea0d43eccd328cfa594e14f7a352
SHA25698fce9f1f8d8acce3e1c12cd42d8466d57b54ce3d78160229a0f58d7091bbbfa
SHA512a007ef97dd8fcf2b09ceca0f56948e06fa53f86833436d5b1915dd9b622d797fd1b1a65f33ea9c46931cbda1b921ace8b66ac5713beded0c4ef56e279eb35134
-
Filesize
5KB
MD53ac25346f745e7ed4bddc34fc259366b
SHA1d68ddea5a81f6d83c888b4bcd45579537e7809f3
SHA25668af0cfc65d76a653a87d114a6a778dde5172547214f3455db3cb959f9f02e48
SHA512b4718766c10da6bce4c9942d6899e8a229ee0f5ed3672079ac608b543da6b7f7dcd67dc96bbdadc841e4145a7aec8eeceed45fb89cbfdbd641b8238cc00657fe