Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 13:26
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BScope.Trojan.Casur.22502.505.dll
Resource
win7-20240611-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BScope.Trojan.Casur.22502.505.dll
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
SecuriteInfo.com.BScope.Trojan.Casur.22502.505.dll
-
Size
19.4MB
-
MD5
b7de49035869691dc4ca215ffd0c9d8e
-
SHA1
acb2bbc8b5f321f1a2a515375c47a393a747da66
-
SHA256
4d25a31d4bce57c865441a72f689d7108c1be5322113985721a60e2d84e21dcb
-
SHA512
103ecebeda2c25d8aca50f4d30fe18a12e4aef0eb199f908c01894abc5059a11748449cf1ff07d0878b30ac2b23ded56b624b9e9fe30413829b378f1eb52e3d9
-
SSDEEP
393216:5EUgIIVHgPIH1V8tzKB6GHBYbav2TVHxZX6dl:2HFH35B6Gubav2lHq
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/680-0-0x0000000074480000-0x0000000075816000-memory.dmp vmprotect behavioral2/memory/680-2-0x0000000074480000-0x0000000075816000-memory.dmp vmprotect behavioral2/memory/680-3-0x0000000074480000-0x0000000075816000-memory.dmp vmprotect -
Program crash 1 IoCs
pid pid_target Process procid_target 1028 680 WerFault.exe 81 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 680 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3276 wrote to memory of 680 3276 rundll32.exe 81 PID 3276 wrote to memory of 680 3276 rundll32.exe 81 PID 3276 wrote to memory of 680 3276 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.Trojan.Casur.22502.505.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.Trojan.Casur.22502.505.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 7003⤵
- Program crash
PID:1028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 680 -ip 6801⤵PID:2264