Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
SecurityCentral.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SecurityCentral.exe
Resource
win10v2004-20240426-en
General
-
Target
SecurityCentral.exe
-
Size
904KB
-
MD5
0315c3149c7dc1d865dc5a89043d870d
-
SHA1
f74546dda99891ca688416b1a61c9637b3794108
-
SHA256
90c2c3944fa8933eefc699cf590ed836086deb31ee56ec71b5651fd978a352c9
-
SHA512
7168dc244f0e400fa302801078e3faec8cdd2d3cb3b8baaab0a1b3c0929d7cf41e54bfbe530ad5ce96a6b63761f7866d26aaae788c3138c34294174091478112
-
SSDEEP
24576:bnQv6Dyxn2Qx0KHizHWKxHuyCcZFyXR1tG:2OE2QtCzhh/7R
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2796 Security Central.exe 2704 Security Central.exe -
Loads dropped DLL 5 IoCs
pid Process 2224 SecurityCentral.exe 2796 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2224-2-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2224-6-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2224-5-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2224-7-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2224-4-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2224-8-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-25-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2224-24-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-27-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-28-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-26-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-35-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-36-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-37-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-38-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-39-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-41-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-42-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-43-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-44-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-45-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-46-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-47-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-48-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-49-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-50-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral1/memory/2704-51-0x0000000000400000-0x0000000000A35000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Security Central = "C:\\Program Files (x86)\\Security Central\\Security Central.exe" Security Central.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Security Central.exe File opened (read-only) \??\X: Security Central.exe File opened (read-only) \??\Z: Security Central.exe File opened (read-only) \??\K: Security Central.exe File opened (read-only) \??\P: Security Central.exe File opened (read-only) \??\Q: Security Central.exe File opened (read-only) \??\J: Security Central.exe File opened (read-only) \??\L: Security Central.exe File opened (read-only) \??\M: Security Central.exe File opened (read-only) \??\O: Security Central.exe File opened (read-only) \??\U: Security Central.exe File opened (read-only) \??\E: Security Central.exe File opened (read-only) \??\G: Security Central.exe File opened (read-only) \??\H: Security Central.exe File opened (read-only) \??\V: Security Central.exe File opened (read-only) \??\Y: Security Central.exe File opened (read-only) \??\T: Security Central.exe File opened (read-only) \??\W: Security Central.exe File opened (read-only) \??\I: Security Central.exe File opened (read-only) \??\N: Security Central.exe File opened (read-only) \??\R: Security Central.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1776 set thread context of 2224 1776 SecurityCentral.exe 28 PID 2796 set thread context of 2704 2796 Security Central.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Security Central\Security Central.exe SecurityCentral.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 Security Central.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1776 SecurityCentral.exe 2796 Security Central.exe 2704 Security Central.exe 2704 Security Central.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 1776 wrote to memory of 2224 1776 SecurityCentral.exe 28 PID 2224 wrote to memory of 2796 2224 SecurityCentral.exe 29 PID 2224 wrote to memory of 2796 2224 SecurityCentral.exe 29 PID 2224 wrote to memory of 2796 2224 SecurityCentral.exe 29 PID 2224 wrote to memory of 2796 2224 SecurityCentral.exe 29 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30 PID 2796 wrote to memory of 2704 2796 Security Central.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecurityCentral.exe"C:\Users\Admin\AppData\Local\Temp\SecurityCentral.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\SecurityCentral.exeC:\Users\Admin\AppData\Local\Temp\SecurityCentral.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Security Central\Security Central.exe"C:\Program Files (x86)\Security Central\Security Central.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Security Central\Security Central.exe"C:\Program Files (x86)\Security Central\Security Central.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD50315c3149c7dc1d865dc5a89043d870d
SHA1f74546dda99891ca688416b1a61c9637b3794108
SHA25690c2c3944fa8933eefc699cf590ed836086deb31ee56ec71b5651fd978a352c9
SHA5127168dc244f0e400fa302801078e3faec8cdd2d3cb3b8baaab0a1b3c0929d7cf41e54bfbe530ad5ce96a6b63761f7866d26aaae788c3138c34294174091478112