Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe
Resource
win10v2004-20241007-en
General
-
Target
SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe
-
Size
1.7MB
-
MD5
f656fa7c591c7e9c59a2492b1a0fba6e
-
SHA1
3886a06b91ecf16e6ae1675e6b2251bc12a2ab9b
-
SHA256
cdce56ba8c1c75ae29b00a49edfe971627fdf38cc086dcd8f1074d3e2dcdbb05
-
SHA512
0ecf98cd4a7bf33e94e29452dc7fc262fff9911fe64ef4f723023b85d5518db6d47b5af6d73dff8966dfd754a887a95546470116069837195096d75f97898838
-
SSDEEP
24576:b7FUDowAyrTVE3U5F/8eLM/bnAqQRfnl5KBkyzzFWea4:bBuZrEUzMznAq+l5Ryvg5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3472 SecuriteInfo.com.Adware.Downware.20415.25150.7817.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Adware.Downware.20415.25150.7817.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 3472 2152 SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe 85 PID 2152 wrote to memory of 3472 2152 SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe 85 PID 2152 wrote to memory of 3472 2152 SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\is-7IAAJ.tmp\SecuriteInfo.com.Adware.Downware.20415.25150.7817.tmp"C:\Users\Admin\AppData\Local\Temp\is-7IAAJ.tmp\SecuriteInfo.com.Adware.Downware.20415.25150.7817.tmp" /SL5="$9024A,837598,832512,C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20415.25150.7817.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-7IAAJ.tmp\SecuriteInfo.com.Adware.Downware.20415.25150.7817.tmp
Filesize3.1MB
MD500463ea8310277479b01445bc4aff6fc
SHA165506ccc10e4806bb2f7ac16f8ef4fb51a56762f
SHA256bb67bf951a9587d784d13f4b559afbf9f5c8db09471ce65dbf91866bffa429b1
SHA512514404d774328d2bddd0fb15b0fb98ac90196e567e66f39cc9f4ac27f67dfeb4e8d0417c450a0f3e06f3e772b311c5b6bddab7e80b95a9da5367ae6d71677b64