Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe
Resource
win10v2004-20240802-en
General
-
Target
SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe
-
Size
1.7MB
-
MD5
76974b990f52405522b0f38f43b9e973
-
SHA1
2e4c67a8772b5bf86b563602b252e3957da7d923
-
SHA256
90846154abe13934aded2cdeb432394148240531ebd58abf5197ae0be73e854d
-
SHA512
74604af64a9bd99e632ecc97c1be8a951fe35d66ada60be57cd5c431578537044a62614817e7361948a0f5ba5a6b689b721b83eea1712c66347faaedcb4fe06d
-
SSDEEP
24576:S7FUDowAyrTVE3U5F/sLuHhCLogeQo40gBxnBJ4sxtMXBCYk:SBuZrEUfRFXgznBJZ1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2828 SecuriteInfo.com.Adware.Downware.20415.28296.31809.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Adware.Downware.20415.28296.31809.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2828 1684 SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe 82 PID 1684 wrote to memory of 2828 1684 SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe 82 PID 1684 wrote to memory of 2828 1684 SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\is-PS3HS.tmp\SecuriteInfo.com.Adware.Downware.20415.28296.31809.tmp"C:\Users\Admin\AppData\Local\Temp\is-PS3HS.tmp\SecuriteInfo.com.Adware.Downware.20415.28296.31809.tmp" /SL5="$70048,837598,832512,C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20415.28296.31809.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-PS3HS.tmp\SecuriteInfo.com.Adware.Downware.20415.28296.31809.tmp
Filesize3.1MB
MD5b672b72cb0c230a5cc12e924195093bd
SHA1ea87c78a1673cf7e6036ea0407ce044e0d0a5219
SHA256a6cc6e1e93465bfc464956e22cea45f5015ab91bfccccdf98b2fdf3a6ded9295
SHA51293159e50fd2de40bbf950677d352fa9d2dcb5c56bc5d447cabfeb2804c15de972be559eeb9cbe014e9ece42471905256200b66bf73edf2431eb32b69af9cb479