Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe
-
Size
707KB
-
MD5
23956e32be182666e0efceecd423376f
-
SHA1
2e00a592b4c2fa8b99b62eb9d0e886bfcc103dc2
-
SHA256
a764b13001e6096c2ac36917bef4405ba8d22b6d06a5741f21977bf46c8afca4
-
SHA512
abe088e593ea900b9ed622b7e1751b2d3f1287b6dc683b99ee76629f4a2c5fecf5a21065ac15e2d6b60ec15bef16f05c2eab31858d0a381f87318cdb3f19bb5b
-
SSDEEP
12288:jfYRGeCHL7BTAIMMMgNTl+kVpMfynA4fA3Nws9Cn6oUisns52wA3ImBlVknu6RtM:jfYIxMMMgNTcv6nAUuS6fbs2wA/leliz
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2368 SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe -
pid Process 1684 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1684 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2368 SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1684 2368 SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe 30 PID 2368 wrote to memory of 1684 2368 SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe 30 PID 2368 wrote to memory of 1684 2368 SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe 30 PID 2368 wrote to memory of 1684 2368 SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Kuldsejlede=Get-Content 'C:\Users\Admin\AppData\Local\hjemmebagtes\Semitisk\Kompagnon.Boa';$Rheumily=$Kuldsejlede.SubString(52518,3);.$Rheumily($Kuldsejlede)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD5b65d9d0954c63abeaa2f3bbfbdb38083
SHA1cb1463622481c3ac5cb5fe4244e3b793450f634b
SHA256e4789c68b39b47d9b8790d5fabc77bc3e48bb018be4d5bffa3adc6825e2a0f2d
SHA512df1c7f3117c3ee307e2de0c7bbe0e0d9ed451e1f726f24572b5b3f2c44051b98fe3a20c68c9b3ad4f0db146b276a836b2dceadfecfc176ad1f49fc113f1ebd22
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a