Analysis
-
max time kernel
41s -
max time network
40s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-04-2021 06:51
Static task
static1
Behavioral task
behavioral1
Sample
1e949d5238fbf2ade45c91bb54de22ea.exe
Resource
win7v20201028
General
-
Target
1e949d5238fbf2ade45c91bb54de22ea.exe
-
Size
590KB
-
MD5
1e949d5238fbf2ade45c91bb54de22ea
-
SHA1
2e72856da91bde014732628119407d637c97a283
-
SHA256
01469064718c89b6853365f1c7008c72ccd6a1ecb88a52cfcf82880e39dd0358
-
SHA512
253007a3c0071e7a16e554ef7beb54b7e4875503e0074886793e34d9c3a77f00f744659755f5ea48187697006e3e6f0482bc3d5f1276ccef17433685a57ea236
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
updachrome.exeupdachrome.exeupdachrome.exeupdachrome.exeupdachrome.exeupdachrome.exepid process 1932 updachrome.exe 1492 updachrome.exe 932 updachrome.exe 1644 updachrome.exe 344 updachrome.exe 1288 updachrome.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Processes:
1e949d5238fbf2ade45c91bb54de22ea.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 1e949d5238fbf2ade45c91bb54de22ea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 1e949d5238fbf2ade45c91bb54de22ea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 1e949d5238fbf2ade45c91bb54de22ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 1e949d5238fbf2ade45c91bb54de22ea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 1e949d5238fbf2ade45c91bb54de22ea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 1e949d5238fbf2ade45c91bb54de22ea.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
updachrome.exepid process 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe 1932 updachrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
updachrome.exedescription pid process Token: SeDebugPrivilege 1932 updachrome.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
1e949d5238fbf2ade45c91bb54de22ea.exeupdachrome.exedescription pid process target process PID 2028 wrote to memory of 1932 2028 1e949d5238fbf2ade45c91bb54de22ea.exe updachrome.exe PID 2028 wrote to memory of 1932 2028 1e949d5238fbf2ade45c91bb54de22ea.exe updachrome.exe PID 2028 wrote to memory of 1932 2028 1e949d5238fbf2ade45c91bb54de22ea.exe updachrome.exe PID 2028 wrote to memory of 1932 2028 1e949d5238fbf2ade45c91bb54de22ea.exe updachrome.exe PID 1932 wrote to memory of 1492 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1492 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1492 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1492 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 932 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 932 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 932 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 932 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1644 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1644 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1644 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1644 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 344 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 344 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 344 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 344 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1288 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1288 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1288 1932 updachrome.exe updachrome.exe PID 1932 wrote to memory of 1288 1932 updachrome.exe updachrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e949d5238fbf2ade45c91bb54de22ea.exe"C:\Users\Admin\AppData\Local\Temp\1e949d5238fbf2ade45c91bb54de22ea.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\updachrome.exeC:\Users\Admin\AppData\Roaming\updachrome.exe updachrome2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\updachrome.exe"{path}"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\updachrome.exe"{path}"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\updachrome.exe"{path}"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\updachrome.exe"{path}"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\updachrome.exe"{path}"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\updachrome.exeMD5
2295742285186ecb7ff7c4634d31bdc8
SHA1f76643300796393b1e616f7e2d925644faae5caf
SHA2560cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25
SHA512102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c
-
C:\Users\Admin\AppData\Roaming\updachrome.exeMD5
2295742285186ecb7ff7c4634d31bdc8
SHA1f76643300796393b1e616f7e2d925644faae5caf
SHA2560cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25
SHA512102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c
-
C:\Users\Admin\AppData\Roaming\updachrome.exeMD5
2295742285186ecb7ff7c4634d31bdc8
SHA1f76643300796393b1e616f7e2d925644faae5caf
SHA2560cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25
SHA512102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c
-
C:\Users\Admin\AppData\Roaming\updachrome.exeMD5
2295742285186ecb7ff7c4634d31bdc8
SHA1f76643300796393b1e616f7e2d925644faae5caf
SHA2560cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25
SHA512102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c
-
C:\Users\Admin\AppData\Roaming\updachrome.exeMD5
2295742285186ecb7ff7c4634d31bdc8
SHA1f76643300796393b1e616f7e2d925644faae5caf
SHA2560cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25
SHA512102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c
-
C:\Users\Admin\AppData\Roaming\updachrome.exeMD5
2295742285186ecb7ff7c4634d31bdc8
SHA1f76643300796393b1e616f7e2d925644faae5caf
SHA2560cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25
SHA512102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c
-
C:\Users\Admin\AppData\Roaming\updachrome.exeMD5
2295742285186ecb7ff7c4634d31bdc8
SHA1f76643300796393b1e616f7e2d925644faae5caf
SHA2560cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25
SHA512102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c
-
memory/1932-8-0x0000000074EE0000-0x00000000755CE000-memory.dmpFilesize
6.9MB
-
memory/1932-9-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/1932-11-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/1932-12-0x00000000004F0000-0x00000000004F5000-memory.dmpFilesize
20KB
-
memory/1932-13-0x0000000005800000-0x00000000058A3000-memory.dmpFilesize
652KB
-
memory/1932-14-0x00000000022C0000-0x0000000002316000-memory.dmpFilesize
344KB
-
memory/1932-5-0x0000000000000000-mapping.dmp
-
memory/1972-3-0x000007FEF6B90000-0x000007FEF6E0A000-memory.dmpFilesize
2.5MB
-
memory/2028-2-0x000007FEFC511000-0x000007FEFC513000-memory.dmpFilesize
8KB
-
memory/2028-4-0x000000014013E000-0x000000014013F000-memory.dmpFilesize
4KB