Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileRepMalware.29184.31872.exe
Resource
win7-20240705-en
General
-
Target
SecuriteInfo.com.FileRepMalware.29184.31872.exe
-
Size
1.6MB
-
MD5
d19a5ac8132e4040179f12eb9366d3b3
-
SHA1
62f90ee5a169215995ac39ee1e9dd18791f9dffa
-
SHA256
2ddec5cb7c8ac3965bf411207a223a485cb5811bc3d730237a956223860635f6
-
SHA512
4dcadc3946054145fd788e8fa5a79f6a3ae62892d8609df63704f3e6a06805e74be1e2832b5601cb0b6f01c3753a5b3ab57e223cd3e0bbf7aac1a8997df3d53b
-
SSDEEP
49152:69NL07qyX3Va5ISHsparMOJBl7qh85F76mWRF:6bL07DXupHspCMOJLqh85F7C
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2416-62-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.FileRepMalware.29184.31872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TypedURLs RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395168194" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Cleared = "1" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395168194" RunDll32.exe Key deleted \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 RunDll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RunDll32.exe Key deleted \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" RunDll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Cleared_TIMESTAMP = e0d82a0cccdfda01 RunDll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RunDll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main RunDll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" RunDll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 SecuriteInfo.com.FileRepMalware.29184.31872.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 SecuriteInfo.com.FileRepMalware.29184.31872.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 744 RunDll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2416 wrote to memory of 744 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 32 PID 2416 wrote to memory of 744 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 32 PID 2416 wrote to memory of 744 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 32 PID 2416 wrote to memory of 744 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 32 PID 2416 wrote to memory of 744 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 32 PID 2416 wrote to memory of 744 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 32 PID 2416 wrote to memory of 744 2416 SecuriteInfo.com.FileRepMalware.29184.31872.exe 32 PID 744 wrote to memory of 2892 744 RunDll32.exe 33 PID 744 wrote to memory of 2892 744 RunDll32.exe 33 PID 744 wrote to memory of 2892 744 RunDll32.exe 33 PID 744 wrote to memory of 2892 744 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.29184.31872.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.29184.31872.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 2552⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationList3⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-