Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/12/2022, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe
Resource
win10v2004-20221111-en
General
-
Target
347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe
-
Size
2.9MB
-
MD5
88bf1121e1d0ca96ece8e377bce99114
-
SHA1
3a163f0c9ea4e0ae7a84c9055124f12492917387
-
SHA256
347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69
-
SHA512
31ad5fe0b2c2edad1264995a5f2e5ccefc12a7f297125158aaee6345e8b3624713811df02377a203d3d622b9e67e158e579173989ec764841d7b47197a37bd53
-
SSDEEP
49152:VIvOif19cydc93E2JHRseXYmKlGrYSSNxm+S:2vOu19cBkmKlG0DDS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2000 cert.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\9A6C028E83F41FABF2454478A8766D95C0085526 cert.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\9A6C028E83F41FABF2454478A8766D95C0085526\Blob = 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 cert.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2000 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 28 PID 1908 wrote to memory of 2000 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 28 PID 1908 wrote to memory of 2000 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 28 PID 1908 wrote to memory of 2000 1908 347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe"C:\Users\Admin\AppData\Local\Temp\347bd3cfa28e398d275a4ffd4d12334c7a99a1a84513e2b7de72a468dc565f69.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\cert.execert.exe -add -c sign.pfx -s -r localMachine root2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD55d077a0cdd077c014eedb768feb249ba
SHA1ea2c62d69a1f6b9d643fe16319ec7632c9533b3f
SHA2568a830c48c4d78159dd80f4dad81c0bebbf9314710026b1a2ef0ffdddcb24b83d
SHA51271bf48dcb6916a810f63710968894b431357aa694aa169067f567cc82b8e4ee732f581afb85b256e5c5a9d15a8b7b5746fa6a8b4127b273feb5b0e03e91b607a
-
Filesize
2KB
MD502f2aa28aeb80df908867479ba496ea9
SHA1e8cf19690d12267c2e85ae27c5293a858fd3254c
SHA256fa3d3ce08523ffd96fca81e460587373f3eb678d0e338072b89a5c089c8cfa26
SHA512893740f8e5a52da14bb7ede5e5144cdbeef80badbae90efee3b56bb50442826936de3afa5d7099c026f05bcb91f2427cd4cfb498d0176e0fdcc1c61073c36c08
-
Filesize
58KB
MD55d077a0cdd077c014eedb768feb249ba
SHA1ea2c62d69a1f6b9d643fe16319ec7632c9533b3f
SHA2568a830c48c4d78159dd80f4dad81c0bebbf9314710026b1a2ef0ffdddcb24b83d
SHA51271bf48dcb6916a810f63710968894b431357aa694aa169067f567cc82b8e4ee732f581afb85b256e5c5a9d15a8b7b5746fa6a8b4127b273feb5b0e03e91b607a
-
Filesize
58KB
MD55d077a0cdd077c014eedb768feb249ba
SHA1ea2c62d69a1f6b9d643fe16319ec7632c9533b3f
SHA2568a830c48c4d78159dd80f4dad81c0bebbf9314710026b1a2ef0ffdddcb24b83d
SHA51271bf48dcb6916a810f63710968894b431357aa694aa169067f567cc82b8e4ee732f581afb85b256e5c5a9d15a8b7b5746fa6a8b4127b273feb5b0e03e91b607a