Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 03:44

General

  • Target

    SecuriteInfo.com.Program.Unwanted.5599.24375.1194.exe

  • Size

    21.5MB

  • MD5

    148d636231401a42505e096ae2a3d31e

  • SHA1

    53261dfeeb8ba52b86cf82180fed669e52984519

  • SHA256

    db3e5db9746c7222963c28c9411c8c7d2faac25f1f05ee5651145334b807a605

  • SHA512

    1a8ed377117d3fe7fad8babfeffd11968d5cba76d50e0a436462348f6aca0ed7dfbdd8eb3d289923630a4a28c1ed79fd241d2cb0a88b5d4d1dbb571f9545f32f

  • SSDEEP

    393216:watZoxR0iWhfetojPSyJPGXscPZf0+IMzeioZNfSMe9zQkPR5h8AmDNqFBtItS7K:w2KYhfnxGfBc+zeioZN/ozQk98AmDy5S

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 47 IoCs
  • Drops file in Windows directory 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 8 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Program.Unwanted.5599.24375.1194.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Program.Unwanted.5599.24375.1194.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\is-E53SB.tmp\SecuriteInfo.com.Program.Unwanted.5599.24375.1194.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-E53SB.tmp\SecuriteInfo.com.Program.Unwanted.5599.24375.1194.tmp" /SL5="$401E8,22077823,146944,C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Program.Unwanted.5599.24375.1194.exe"
      2⤵
      • Checks BIOS information in registry
      • Checks computer location settings
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Program Files (x86)\Auslogics\Driver Updater\DriverUpdater.exe
        "C:\Program Files (x86)\Auslogics\Driver Updater\DriverUpdater.exe" /install /setautostart
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:4072
      • C:\Program Files (x86)\Auslogics\Driver Updater\DriverUpdater.exe
        "C:\Program Files (x86)\Auslogics\Driver Updater\DriverUpdater.exe" /FromInstall
        3⤵
        • Checks BIOS information in registry
        • Writes to the Master Boot Record (MBR)
        • Checks computer location settings
        • Drops file in Windows directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks SCSI registry key(s)
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3300
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Auslogics\Driver Updater\CommonForms.Routine2.dll

    Filesize

    923KB

    MD5

    2b40ae3d04fc6f978e7a9ccd3493e69a

    SHA1

    85a7cbafbbf9fa4770202ce435d3aa632301f3dd

    SHA256

    c01f3312eeb95ef214c141935285e9451b266b0140492bb705306d076f0ed58c

    SHA512

    5cc38c80b4ef4c89a57fa364ee79f16b4d8f8d0bb8203bd84b36fe22620f21d57ab3fc824e218c65edd0c5eb10cb386383b0168897d23e36bd06b724433a14c6

  • C:\Program Files (x86)\Auslogics\Driver Updater\Data\main.ini

    Filesize

    462B

    MD5

    ee201a1a86352caaf73cb8980a4dca93

    SHA1

    6f928b68118a8442e019fea98d85a62b56330897

    SHA256

    2d3b7da135e8b1cf6d8c44a1d7b2724bd2fc4aa552a0ce20e9bc93626c06cc83

    SHA512

    cf7ced1fe22227f8f28f42b5a6428842c0141017fb2a22cc192a6ded099d695145d73f5146535acc5ff7997b60d39fe0e7219b4da9c88fdbe762ce7e29696c5c

  • C:\Program Files (x86)\Auslogics\Driver Updater\DriverUpdater.exe

    Filesize

    9.0MB

    MD5

    c479e499c43d824246569c7afc12a987

    SHA1

    84fc35239b55d85594e3c65ef21519817d3b2cea

    SHA256

    78ca32bf9357309254dfaef094f287f45e0cd70a4bea027ec95e3fca4d4b3cc2

    SHA512

    a4ff168e1add86395f2d4e3335337ec7e432398ad2baa44e3ab1a97830c1b32d541d17d965b00cd0cdb5d6331b262bf280a76da322647e2e89367b6c4b1813a5

  • C:\Program Files (x86)\Auslogics\Driver Updater\DriverUpdaterHelper.dll

    Filesize

    2.6MB

    MD5

    f814a293f1dcb688bc122b36ac492477

    SHA1

    809732d40bbc590bacc62f85b8e48b57082fc8bf

    SHA256

    7089a1f2699845284dd63ac1c61ba32173b5d9aa19f08d93017aab0cb92d47a3

    SHA512

    3c354e548c49438f4f5727cce6b8c272873aa77472a503cf99e78b4a63d315b647a0670862cb00811cf2c73bed0388262c240c3b653795664f63fd0c426a1abc

  • C:\Program Files (x86)\Auslogics\Driver Updater\HWHelper.dll

    Filesize

    3.3MB

    MD5

    c68d417da2cf8dbee685774d7b362c71

    SHA1

    847d227c63bc70709f18b10064c9c7065f5c0c50

    SHA256

    623e7cc3b12eaa93fbd21d942a7503b77e94eac275df8d59efbddc522027427b

    SHA512

    da65a30ed4120e9f2303cb9afa6c47feec28ab565e41c70d5a7d0dfb3bf203e7bd6571994d3c1420a42d45d8ea57cd1a71996f117203cb50265de00b2ae2baad

  • C:\Program Files (x86)\Auslogics\Driver Updater\OxComponentsRTL.bpl

    Filesize

    1.2MB

    MD5

    f4c54fed66918aaba11549ecdfc4a010

    SHA1

    3b419014a84d49b2ad24dd8b9c6e19195852cdb3

    SHA256

    1acb89b3ce2844e683949446ea2a68f90a9e3a34ead840ba1fe8811667a1c26b

    SHA512

    e3a99f8ff9dcc981f85af4b2ede4f70f84c7d1d48147e57ebbb98fc50f33d0fca6822ede496f4413702b591d31dba311231ecb6be84bab7d4a27cc5c2cc47c0c

  • C:\Program Files (x86)\Auslogics\Driver Updater\TaskSchedulerHelper.dll

    Filesize

    549KB

    MD5

    df4081419340ac8aaa4b92ae8afda480

    SHA1

    ea4d337de2212c144a88db874a1650afac96fdca

    SHA256

    55d233e18d94d59182279ad8cea148193425fe9d5a4d9321fb9520fadec3f494

    SHA512

    83708cf768ae78f5d4678bb966c1c0636dbf6a5ea2484b8ff41bbeac11fd892147e6b86cfca4cfba2cbb82ccff45c8566e047f39428a1ac19fa8eaee1ca2aa71

  • C:\ProgramData\Auslogics\Driver Updater\2.x\Data\adu_sign.dat

    Filesize

    936B

    MD5

    2049d1e3200aed105e95952f868c0bde

    SHA1

    1f9d2c17b241e91a8546ea1a8a378556f6810ed7

    SHA256

    20a6fe03c3091dc24652e381f94f145ce4e62ef035dae63706f1fe9736acb3b8

    SHA512

    c4e2f45fbd7db58babe0367304366f7befcf3caf7d2fdbb321dc4ee70bb22d2065d68559b7b8a472ff26fe25a4725ed9692fe559070b46c339dcebcb8b0c1a07

  • C:\Users\Admin\AppData\Local\Temp\is-E53SB.tmp\SecuriteInfo.com.Program.Unwanted.5599.24375.1194.tmp

    Filesize

    1.2MB

    MD5

    0c8aad3db1436371794e0440b585ee9e

    SHA1

    c67b07c3498eafb561be7c8a06ce912899f6cb14

    SHA256

    9b61476504c3ed1ee746df2d4d4a1e98152ce57b95b1bc9da90f073918c6674a

    SHA512

    4872f63f3e6a1fe10aca0fda34f2beb7ca8b8649283a2f59258576b9951123a96da2bdbb4d3aefde1e00477e484429f8f585501facad35799021a87ad2fc48cd

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\AxComponentsRTL.bpl

    Filesize

    2.5MB

    MD5

    97fd3089745d2a3bb2d20add1b4cfc78

    SHA1

    3bff7a3e7b031d3a62226222b99bf04d6b49ab25

    SHA256

    cec1a7fc0d3cb5ecfea61be05cbc50b3323b8cb6f9e9f97f813b79c88d99182d

    SHA512

    d73c3e55aa65a2fae1ccacf916cbad57bd23c1a5b4861d307b956ebccb02a81949e8e7eef29324bb30ca997c094651942bafa3badc2dc50e7f5bf41802ef2e27

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\AxComponentsVCL.bpl

    Filesize

    8.8MB

    MD5

    a0b6b743dfa0bf54175cb468e984336e

    SHA1

    dea0e524624983f9badd1eb6d1d3ced3afd5051a

    SHA256

    8c165b3edd1ced3276731b3f440947ccb52f7b20043933a74024718ac4a57392

    SHA512

    3a17a13d2efe366647770d3b611069baabda160f62bf2fe088b6de8516206f3cc890699abbc0ae853dd2ecc5bcd1f41ee50e42dd83331d06cd0048a0a50ea42f

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\BrowserHelper.dll

    Filesize

    2.0MB

    MD5

    73e346feffd403c5563bb90921b4f1c8

    SHA1

    1dd914d86be5f254e8a981c7ec7386e77cf79576

    SHA256

    a598fc217ed0f1d2a3f363490961f030adbbed352527d9afff84bcd8d6262172

    SHA512

    9b5d5440a998d4797b95c6cf61b7097a75a7ec321890f5624d5ed2be9d4be212b0f02f2b377441d449223a685b096c4ec5426624d58a8f47af699a7bd2c5d7ae

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\CFAHelper.dll

    Filesize

    97KB

    MD5

    a2290094a52eae96c81eb762bc9e6331

    SHA1

    ab84db3dd2bf3cc1424e6011686f75a99a3a9a40

    SHA256

    6c47561d57de8b673160d8c2dde6667753aa3e4ac24a44950b7845fddc65369f

    SHA512

    6cbbfd73edc8e53c5da0f6b589b61378ae69e99b5e918a1cc405afb8d0e52f792e5cbc4feb78b3579fc87dde60755aa3a39798842188c7bc9f3ee7317baf3b8e

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\CommonForms.Site.dll

    Filesize

    345KB

    MD5

    94dca7eca6944692a687565392f4bf16

    SHA1

    f1550a9c7c1d091792713b59a257d506ab3777b1

    SHA256

    635be68cf6ddb8de72208e3b9d5a80c41dd0585c42a727c9958cfef109a76816

    SHA512

    1b00581597b96439568820c4feb7969d0840f4b2454ce6bd3cbdcd2562207d1bf7aef6b58d155a68371735acf696f63871d43212140da129cc3d9fc9a5a54d1f

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\GoogleAnalyticsHelper.dll

    Filesize

    177KB

    MD5

    cd05fe6088850b36d2540805f02d8ebd

    SHA1

    0be8fd6d6837f444b363ded140b8f3de594cd03e

    SHA256

    04b649902a180c1531282de2038bfbc01a8b297a56282a785848525ac10ebac2

    SHA512

    2b2d315a890df23f857f9d50884d1a8f5824c3611a2137a859a6f7ed62076882c3b86e5e222e63a0bb4b2f54758b824ec4c33e825c31be6e9d60d0af7e9d53d6

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\Localizer.dll

    Filesize

    192KB

    MD5

    61b0aace0a37b00f33e0f1cf5f9f38ec

    SHA1

    24921bc36461dae98a961dae57d25fa17e710e83

    SHA256

    ac7e5695941851571ab4ec88dd0773346461622238366d741ccd9f165e0655b9

    SHA512

    ebd0ce4f5d44e452fd167498b65bdf2a5754b637bb8370bf6d5e5ee9926d8dc1a7671c82650ff832936b6acfe7e8a22df5b776b3d1aa29e00149391563cec5e4

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\SetupCustom.dll

    Filesize

    1.6MB

    MD5

    3fe36d25b8a2287bd61a571de8178572

    SHA1

    a7e2b658cfbd4c1e7df7fd89eb2f989c73eceaea

    SHA256

    c00e9807332d316fb5ed1584407fe6f6b8748aab39efd9fea6a3aacb5caf39c9

    SHA512

    6905685fc321539d7a52007a4cd7e332288deaf253f752c9949fbce68743238951c37294d32d70a187727070b5b05858791612d334a28aa9acf36610f2bd30b0

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\enu.lng

    Filesize

    166KB

    MD5

    e50f65e9f67c0c2c63bd9175d2ed824e

    SHA1

    61e1a79b023ab2f7307947955395d355da5d7791

    SHA256

    d3055229d7f292a23f5195c0a473c219433bda9d3a5e99a43062ea6a84d7a3a0

    SHA512

    1afa52e2243c196de01f396d7c81414af0bb6bca3c9d3258f144c634cf00cb170c423216b9a2163826d2481271c60b65f0987f2606998f41ea1df4f5f6dbec24

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\rtl250.bpl

    Filesize

    10.1MB

    MD5

    942cc74b7ef66b51859d135fa3bc8bb2

    SHA1

    642810b822d9e4ddd40faafb7437b552d2ad7d56

    SHA256

    66f2f6b2e8c24827d63f6415094ae40fddd50f30e097cda395cc0116d57356a6

    SHA512

    941e41ed4031674168d4b4380d52cdea4d3077c1e871a9f61d8c85030befda654b06cb5da666d906130fa2d5b985573b274f9d77ac570b634be295baefa385e5

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\sqlite3.dll

    Filesize

    1.1MB

    MD5

    e156dc5c72b931df7d794f3dc026eab9

    SHA1

    783678eff02b18a70bdd7eb414939938fa9966c2

    SHA256

    3c8af269a5ec96e3860cfd8c7a499e43b5c78e907be789270f56a525ec1ea4e0

    SHA512

    d4b97ba9eb1a892288475fd9974bbed3ded74cdad8585671e14e36ad4f2ce30ddfc85431b750271339a4b53a97d2de79713cc251b7a511c732cb1d59d102e4ec

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\vcl250.bpl

    Filesize

    3.9MB

    MD5

    e4f482e3f7eb949256402c38e467122f

    SHA1

    2910db3ffc1769d2ae83b6569fa91e79faaa4033

    SHA256

    10b9d8569b8f9e9e46e7a579855492353c43f1e3b5d4a28959015bed5570350c

    SHA512

    8dc4eadc0ebe0cc86e7ac85843c16be5cc563a5dce2985f34b4769786e5d2f7176b62506854ef5e5b75a58aa1cbe45934650e7cab098a639bc62affe9119241b

  • C:\Users\Admin\AppData\Local\Temp\is-PAPN1.tmp\vclimg250.bpl

    Filesize

    355KB

    MD5

    57496780b9a5c733144e5663f088f42a

    SHA1

    ccdd74d1a638629f8fdba43ce1180a23d7a463dc

    SHA256

    6be794294ff9c4b27debc6ed50fce865d028cf496d4e39fcce9c4f8e48cbfbfd

    SHA512

    50cf52cc8524551e9fd106c823039f604df2b92d2de859ef2d4b85016d603a6c31dc928e155949554c20ebd63f5b5665b627cc8853576a6149f2213b533f16d0

  • C:\Windows\INF\c_processor.PNF

    Filesize

    5KB

    MD5

    b70885a375837ad4f821dda18e0c9fe0

    SHA1

    ec174ab9c47377938592c28f261114d633a0f965

    SHA256

    408cad6c31dff32d030cdc19330045f1c5066ca63fb607604ba0e47a06e7f8cf

    SHA512

    5d8d72fdfc3d483a407e91f776080f19c8eaba754ee2fd81eb4320bbd30ca2b6b975ef6fec00ad177a1305694f18bae66ad174c54f2e6b3a5287000ae591d2ed

  • C:\Windows\INF\c_volume.PNF

    Filesize

    4KB

    MD5

    8b0c8f54383cef8ac91d3c21663b21fc

    SHA1

    0bc698df786a3396c58ecca34207a4c81985af10

    SHA256

    41cef722ddac2159237cc6c4adc318e75d5b1159373d616e9bdd35f807d2280e

    SHA512

    80a87ef617b5fb2e8ff1cc63b45d2f7f8a368da382bb9bf6d5863f83748f3ea1ade79c6ac7a0de8203d1d43eef01a603bfbc9d47a0d3b9fa56bd71b235c6c8b0

  • memory/1340-51-0x0000000003550000-0x0000000003E29000-memory.dmp

    Filesize

    8.8MB

  • memory/1340-298-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/1340-87-0x0000000005110000-0x0000000005130000-memory.dmp

    Filesize

    128KB

  • memory/1340-84-0x0000000004F70000-0x0000000004FC9000-memory.dmp

    Filesize

    356KB

  • memory/1340-62-0x0000000004C10000-0x0000000004C30000-memory.dmp

    Filesize

    128KB

  • memory/1340-63-0x0000000004C10000-0x0000000004C30000-memory.dmp

    Filesize

    128KB

  • memory/1340-122-0x000000000E960000-0x000000000E970000-memory.dmp

    Filesize

    64KB

  • memory/1340-128-0x000000000EB00000-0x000000000EB10000-memory.dmp

    Filesize

    64KB

  • memory/1340-114-0x0000000005AC0000-0x0000000005CC7000-memory.dmp

    Filesize

    2.0MB

  • memory/1340-599-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/1340-57-0x0000000003E30000-0x0000000004856000-memory.dmp

    Filesize

    10.1MB

  • memory/1340-86-0x0000000005110000-0x0000000005130000-memory.dmp

    Filesize

    128KB

  • memory/1340-75-0x0000000004C30000-0x0000000004C62000-memory.dmp

    Filesize

    200KB

  • memory/1340-48-0x00000000034F0000-0x000000000354A000-memory.dmp

    Filesize

    360KB

  • memory/1340-107-0x00000000051E0000-0x000000000520E000-memory.dmp

    Filesize

    184KB

  • memory/1340-109-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/1340-33-0x0000000003350000-0x00000000034E2000-memory.dmp

    Filesize

    1.6MB

  • memory/1340-448-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/1340-6-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/1340-102-0x00000000051C0000-0x00000000051DB000-memory.dmp

    Filesize

    108KB

  • memory/2052-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2052-146-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2052-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB