Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe
Resource
win10v2004-20240426-en
General
-
Target
SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe
-
Size
18.5MB
-
MD5
d3c84f235445646915ce3271fdbad74f
-
SHA1
a8e6048c8a0bedc1f897fd94d95cfa93ead4c8e1
-
SHA256
c7026676c7ae458b71bf722de69aaa05363a56d121c50047f9a63d2020e4db14
-
SHA512
03d4d45d76c80281e36c650a68ad3f683d382fe559c405c1045240490343b277b2f854627134a7f97534789c1a05fb0eb1ed63228aca2a86704962b4081ea32e
-
SSDEEP
393216:k5QwFe2WehslP2WmpO1d4kjTaIicEyEwEWAPVOBR+FKotN8m+Q6x:k2ge2hGqpO1d46aIrjETVOb+w0N5Gx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
nuker.exepid process 2776 nuker.exe -
Loads dropped DLL 2 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exenuker.exepid process 2328 SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe 2776 nuker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exedescription pid process target process PID 2328 wrote to memory of 2776 2328 SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe nuker.exe PID 2328 wrote to memory of 2776 2328 SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe nuker.exe PID 2328 wrote to memory of 2776 2328 SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe nuker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\onefile_2328_133626040333674000\nuker.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.36782.3461.5857.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b