Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
21-10-2021 15:44
Static task
static1
Behavioral task
behavioral1
Sample
DigiCertUtil.bin.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
DigiCertUtil.bin.exe
-
Size
3.1MB
-
MD5
cd08f5aee51ce2ef2d4b1bd567adac90
-
SHA1
32ebfee9645f42c3719101df980832eccd24ee4c
-
SHA256
20229d2217d12e73f130c72645d7edf384c630973775d9f38326dfee0295cb12
-
SHA512
78d3c08da6f854774498f257e0a5479245376cda115773a47bfb3b621db6a0e132ad3539237bb09336f0de7b34bbf42e24c53fb02ef450edf430f2d7cf245424
Malware Config
Signatures
-
Drops file in Program Files directory 3 IoCs
Processes:
xcopy.exedescription ioc process File opened for modification C:\Program Files (x86)\Security xcopy.exe File created C:\Program Files (x86)\Security\DigiCertUtil.bin.exe xcopy.exe File opened for modification C:\Program Files (x86)\Security\DigiCertUtil.bin.exe xcopy.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
xcopy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
DigiCertUtil.bin.exepid process 764 DigiCertUtil.bin.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
DigiCertUtil.bin.exepid process 764 DigiCertUtil.bin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
DigiCertUtil.bin.exepid process 764 DigiCertUtil.bin.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
DigiCertUtil.bin.execmd.execmd.exedescription pid process target process PID 764 wrote to memory of 912 764 DigiCertUtil.bin.exe cmd.exe PID 764 wrote to memory of 912 764 DigiCertUtil.bin.exe cmd.exe PID 764 wrote to memory of 912 764 DigiCertUtil.bin.exe cmd.exe PID 764 wrote to memory of 912 764 DigiCertUtil.bin.exe cmd.exe PID 912 wrote to memory of 792 912 cmd.exe xcopy.exe PID 912 wrote to memory of 792 912 cmd.exe xcopy.exe PID 912 wrote to memory of 792 912 cmd.exe xcopy.exe PID 912 wrote to memory of 792 912 cmd.exe xcopy.exe PID 764 wrote to memory of 680 764 DigiCertUtil.bin.exe cmd.exe PID 764 wrote to memory of 680 764 DigiCertUtil.bin.exe cmd.exe PID 764 wrote to memory of 680 764 DigiCertUtil.bin.exe cmd.exe PID 764 wrote to memory of 680 764 DigiCertUtil.bin.exe cmd.exe PID 680 wrote to memory of 1560 680 cmd.exe schtasks.exe PID 680 wrote to memory of 1560 680 cmd.exe schtasks.exe PID 680 wrote to memory of 1560 680 cmd.exe schtasks.exe PID 680 wrote to memory of 1560 680 cmd.exe schtasks.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe PID 764 wrote to memory of 824 764 DigiCertUtil.bin.exe xwizard.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DigiCertUtil.bin.exe"C:\Users\Admin\AppData\Local\Temp\DigiCertUtil.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c xcopy "C:\Users\Admin\AppData\Local\Temp\DigiCertUtil.bin.exe" "%ProgramFiles%\Security\" /y /i /c /q2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\DigiCertUtil.bin.exe" "C:\Program Files (x86)\Security\" /y /i /c /q3⤵
- Drops file in Program Files directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\DigiCertUtil.bin.exe" /it /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\DigiCertUtil.bin.exe" /it /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\xwizard.exeC:\Windows\System32\xwizard.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/680-64-0x0000000000000000-mapping.dmp
-
memory/764-70-0x000000004A0F0000-0x000000004A13C000-memory.dmpFilesize
304KB
-
memory/764-69-0x000000004A0F0000-0x000000004A13C000-memory.dmpFilesize
304KB
-
memory/764-56-0x0000000000180000-0x000000000018B000-memory.dmpFilesize
44KB
-
memory/764-59-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/764-60-0x00000000051F0000-0x00000000051F1000-memory.dmpFilesize
4KB
-
memory/764-61-0x0000000000C40000-0x0000000000DC0000-memory.dmpFilesize
1.5MB
-
memory/764-54-0x0000000075651000-0x0000000075653000-memory.dmpFilesize
8KB
-
memory/764-57-0x0000000000C40000-0x0000000000DC0000-memory.dmpFilesize
1.5MB
-
memory/764-58-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/764-68-0x000000004A0F0000-0x000000004A13C000-memory.dmpFilesize
304KB
-
memory/764-66-0x0000000015940000-0x000000001594C000-memory.dmpFilesize
48KB
-
memory/792-63-0x0000000000000000-mapping.dmp
-
memory/824-67-0x0000000000090000-0x0000000000093000-memory.dmpFilesize
12KB
-
memory/824-76-0x0000000001CC0000-0x0000000001E40000-memory.dmpFilesize
1.5MB
-
memory/824-71-0x0000000000000000-mapping.dmp
-
memory/824-74-0x0000000000090000-0x0000000000093000-memory.dmpFilesize
12KB
-
memory/824-75-0x0000000001CC0000-0x0000000001E40000-memory.dmpFilesize
1.5MB
-
memory/912-62-0x0000000000000000-mapping.dmp
-
memory/1560-65-0x0000000000000000-mapping.dmp