Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe
Resource
win10v2004-20241007-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe
-
Size
893KB
-
MD5
6da3ec62800b295f92d268c84f121259
-
SHA1
4b4dc1a6f67769f726e89afbcc39d23bf38978b8
-
SHA256
46e0bbdbdffa58d201e3aa377f77d4f85a7704a60042eaf13d5cedf70808e937
-
SHA512
b788878965c65a89b688a610aed65e51efefe60c0dbd5f21a15ecde39479ca75e614f6d4ee29f0b2d438d1b55418f5b448f46a2e308c8d72b46c5be491188321
-
SSDEEP
24576:kCNgmMtTCrukMSZvRWDrlU/1TP477WS8Cy1IZVKU1WALQ2k:ymMBCrhMSpRW6tTl5mZ0jALQ
Malware Config
Extracted
systembc
claywyaeropumps.com
178.132.2.10
-
dns
5.132.191.104
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4592 created 3544 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 56 PID 2680 created 3544 2680 dpesg.exe 56 -
Executes dropped EXE 3 IoCs
pid Process 2680 dpesg.exe 4068 dpesg.exe 3116 dpesg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DiagsCap = "C:\\Users\\Admin\\AppData\\Roaming\\DiagsCap.exe" SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4592 set thread context of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 2680 set thread context of 4068 2680 dpesg.exe 114 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpesg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpesg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 2680 dpesg.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe Token: SeDebugPrivilege 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe Token: SeDebugPrivilege 2680 dpesg.exe Token: SeDebugPrivilege 2680 dpesg.exe Token: SeDebugPrivilege 3116 dpesg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 4592 wrote to memory of 4460 4592 SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe 100 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114 PID 2680 wrote to memory of 4068 2680 dpesg.exe 114
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.28320.7917.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\ProgramData\xabvg\dpesg.exe"C:\ProgramData\xabvg\dpesg.exe"2⤵
- Executes dropped EXE
PID:4068
-
-
C:\ProgramData\xabvg\dpesg.exeC:\ProgramData\xabvg\dpesg.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680
-
C:\ProgramData\xabvg\dpesg.exeC:\ProgramData\xabvg\dpesg.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD56da3ec62800b295f92d268c84f121259
SHA14b4dc1a6f67769f726e89afbcc39d23bf38978b8
SHA25646e0bbdbdffa58d201e3aa377f77d4f85a7704a60042eaf13d5cedf70808e937
SHA512b788878965c65a89b688a610aed65e51efefe60c0dbd5f21a15ecde39479ca75e614f6d4ee29f0b2d438d1b55418f5b448f46a2e308c8d72b46c5be491188321