Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileRepPup.22616.9001.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.FileRepPup.22616.9001.exe
Resource
win10v2004-20240508-en
General
-
Target
SecuriteInfo.com.FileRepPup.22616.9001.exe
-
Size
4.8MB
-
MD5
39490d6ae5b10a8cdffecd71d05141dd
-
SHA1
450da6260c6817aca8d9444831a48439ba45785c
-
SHA256
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb
-
SHA512
7ffb9cb6a53cf233b6ff396eeb6193e683aed75001b3f73a1bbadaeec3ff7dcbce9b7e215d1743a4374e488185b824b90dde4afe93a8d93608b6340af07c14fb
-
SSDEEP
98304:rcAf/HlqfEBwysMKalG8zzgg+t2TIJIX3gGKV0wMa8/FJjVBl5+pEs:rr/lqfEBwlMllPzzp+t2540w0jjVP5A
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 5 IoCs
Processes:
SecuriteInfo.com.FileRepPup.22616.9001.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira SecuriteInfo.com.FileRepPup.22616.9001.exe Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\AVAST Software\Avast SecuriteInfo.com.FileRepPup.22616.9001.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast\Version SecuriteInfo.com.FileRepPup.22616.9001.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast\Version SecuriteInfo.com.FileRepPup.22616.9001.exe Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Avira SecuriteInfo.com.FileRepPup.22616.9001.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
SecuriteInfo.com.FileRepPup.22616.9001.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main SecuriteInfo.com.FileRepPup.22616.9001.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch SecuriteInfo.com.FileRepPup.22616.9001.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" SecuriteInfo.com.FileRepPup.22616.9001.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
SecuriteInfo.com.FileRepPup.22616.9001.exepid process 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.FileRepPup.22616.9001.exepid process 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe 2256 SecuriteInfo.com.FileRepPup.22616.9001.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepPup.22616.9001.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepPup.22616.9001.exe"1⤵
- Checks for any installed AV software in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD50f722e725ac50271f9d6db477e8c0d17
SHA1d34259cfe05b2ba9c9e5256a3ce513d4bc5afbe8
SHA2567615a4bb88a5680cfead49c1774013ce48c4c7343cb82d7585f7935c705400b0
SHA5129a58e7d1537f28f19dc6e63b36d422748d851b68a8b3eedf69f531d502d9163e41f4d9cc9d782fd6fc70fab269f04dc9907422bd80f5dd265edcc0ae6bddc77a
-
Filesize
314KB
MD52dd0a1de870af34d48d43b7cad82b8d9
SHA1440f4f1fdf17a5c8b426ac6bd4535b8fe5258c7e
SHA256057bc6c47c47aaccdf31adc48a6b401f6090a02c28e354099eff80907dc2af32
SHA51283df193ab984037b940876bf6371020b4bb13af74e988abb8ad6a30d48ab6cd9dc5c08937e58abab93278cc85c9d79c373688b2c51c035fdeffed639c933e8ff
-
Filesize
176KB
MD5b9077621ce786b55c176a61456bfc077
SHA15f164e1bc0b6573bac876e38ca1bb2e60ff0627e
SHA2566cedf381d59fa4caabfb836e9a3720420645cbcea32491a5ac5f07cf274ceac6
SHA512b1f2c599804a2d0ac51d3adfe7b2d0a21c5fa1e3d8d83d932f42d30bfd26aad5972d96555097a60f8fdc4d34ed24bad2876a89cf0b27b8cd01c72c0ba8f4d02a
-
Filesize
975B
MD50e5fea82cc4f4a8225532e5b2f45c6c8
SHA1b163d952a4a5b0c3ea40da2b47f95e624e344c96
SHA25681b5f50491579127d13e050847ef6d817265ab4b70d2796fb74021463b778bb9
SHA512051507296cd4d51ce4d34f0d1dd0a078f7598645ec42321335cec5719152c05dc611c663c67b3265e3baf14fd6e0c93788e2d0b04c6e5c16f4203dbd206b3f44
-
Filesize
32KB
MD591400b2119f89b8b1714bd4559590fdc
SHA10b5a10065fc35b34dc128d43d570f7c7b6c3960f
SHA256e01627f942e2139c70affbd89a7ce70bb3c9be0feef25ae446125916504a0269
SHA512e05f2af8535bc43fab18e262fa69620f3ed074143251ece8e567698e748e7e03a6b22f450911734d0d62246485051b454df8bc69528b36195496f664aa2dbedc
-
Filesize
202KB
MD5a4fdd77e182bd2fabe300a47b5617a35
SHA1e002b335c75b5edefcd251962f61f53a2ab8e0f2
SHA2568b59592d67eadc703af6cdd5ba8d077f9f9485d01fb6405555614335f89be99b
SHA512ddcccde1c129f8f71fb39685abc615c4202b8b3dfc12cedd7d9cca2f97b308fc14b64497826421fa9df3d1cf54bdae9c085051af0a8d393cd3d556a6578d4085
-
Filesize
89KB
MD5ea75b2a8f1b4241a872b1cbddbaed154
SHA118678dd78c1f5a3525127b442bc70375faf09c16
SHA2564a62927a380e201c4ee51321dcc1e6b1f7dfbf82049cf349df990629e01e9178
SHA512dc69cd4703dcba3c8f4a52058c44a34fa7c0b6096bed20f30ce3dab872461eb6dda9d0d381137b9cb022219ad92ca7f5f25d3964ed33d5f41e9fc05efa5330fd