Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 15:38

General

  • Target

    SecuriteInfo.com.Adware.InstallCore.768.7677.16658.exe

  • Size

    66.9MB

  • MD5

    8c9d7c62d1c19373bb581d879f012b33

  • SHA1

    e0f20fb98b4cd4dee40cccebf82720f1f8f6ac98

  • SHA256

    a27938941515ef4fe27eb078868b252817cff0c33c665db61eb6a499033c3627

  • SHA512

    62049169515c8f3e81f2b502dfed2f1c271975301e44bb216e52202d200d396dafbf54c046914b00a14101944cad3b6370271e69ffb82cb1d5925a4c569f2e49

  • SSDEEP

    1572864:bb6Jk++crwJvCwmUuKv58gfJfu4VGklfA4LI:vax+pJvCwmzrYJfu4xfA4s

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.InstallCore.768.7677.16658.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.InstallCore.768.7677.16658.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\is-A9O5G.tmp\SecuriteInfo.com.Adware.InstallCore.768.7677.16658.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-A9O5G.tmp\SecuriteInfo.com.Adware.InstallCore.768.7677.16658.tmp" /SL5="$100048,69853475,53248,C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.InstallCore.768.7677.16658.exe"
      2⤵
      • Executes dropped EXE
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-A9O5G.tmp\SecuriteInfo.com.Adware.InstallCore.768.7677.16658.tmp

    Filesize

    669KB

    MD5

    52950ac9e2b481453082f096120e355a

    SHA1

    159c09db1abcee9114b4f792ffba255c78a6e6c3

    SHA256

    25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

    SHA512

    5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

  • memory/2024-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2024-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2024-13-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2284-7-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/2284-14-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB