Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 02:51
Behavioral task
behavioral1
Sample
56743369a3de6059006e421ac67773f6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56743369a3de6059006e421ac67773f6.exe
Resource
win10v2004-20231215-en
General
-
Target
56743369a3de6059006e421ac67773f6.exe
-
Size
1.5MB
-
MD5
56743369a3de6059006e421ac67773f6
-
SHA1
75edab051211718a744f0b5a7a6d761317219bcc
-
SHA256
26309928501a6a64c8fcb60db37891956778af3e02b8f1def0847fae7370f43e
-
SHA512
f65477d6dec264e019debf325479792ae14b60e7ff5756b8a34195a644eb570be1be2266393f5ae4708722362736782da1b5a651c87eff7d8a8de725bfe40cb5
-
SSDEEP
24576:0/PhVMX54zAdkqZxdcjukL2N3I5hC2TH5tY9NlqMcjukL2Y:0/PhVMX56AGqZxdcakLWqhC2TH5t8Nla
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1344 56743369a3de6059006e421ac67773f6.exe -
Executes dropped EXE 1 IoCs
pid Process 1344 56743369a3de6059006e421ac67773f6.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 56743369a3de6059006e421ac67773f6.exe -
resource yara_rule behavioral1/memory/2244-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000014313-17.dat upx behavioral1/files/0x000b000000014313-13.dat upx behavioral1/memory/1344-19-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000014313-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2396 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 56743369a3de6059006e421ac67773f6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 56743369a3de6059006e421ac67773f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 56743369a3de6059006e421ac67773f6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 56743369a3de6059006e421ac67773f6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2244 56743369a3de6059006e421ac67773f6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2244 56743369a3de6059006e421ac67773f6.exe 1344 56743369a3de6059006e421ac67773f6.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1344 2244 56743369a3de6059006e421ac67773f6.exe 20 PID 2244 wrote to memory of 1344 2244 56743369a3de6059006e421ac67773f6.exe 20 PID 2244 wrote to memory of 1344 2244 56743369a3de6059006e421ac67773f6.exe 20 PID 2244 wrote to memory of 1344 2244 56743369a3de6059006e421ac67773f6.exe 20 PID 1344 wrote to memory of 2396 1344 56743369a3de6059006e421ac67773f6.exe 22 PID 1344 wrote to memory of 2396 1344 56743369a3de6059006e421ac67773f6.exe 22 PID 1344 wrote to memory of 2396 1344 56743369a3de6059006e421ac67773f6.exe 22 PID 1344 wrote to memory of 2396 1344 56743369a3de6059006e421ac67773f6.exe 22 PID 1344 wrote to memory of 2784 1344 56743369a3de6059006e421ac67773f6.exe 29 PID 1344 wrote to memory of 2784 1344 56743369a3de6059006e421ac67773f6.exe 29 PID 1344 wrote to memory of 2784 1344 56743369a3de6059006e421ac67773f6.exe 29 PID 1344 wrote to memory of 2784 1344 56743369a3de6059006e421ac67773f6.exe 29 PID 2784 wrote to memory of 2868 2784 cmd.exe 27 PID 2784 wrote to memory of 2868 2784 cmd.exe 27 PID 2784 wrote to memory of 2868 2784 cmd.exe 27 PID 2784 wrote to memory of 2868 2784 cmd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\56743369a3de6059006e421ac67773f6.exe"C:\Users\Admin\AppData\Local\Temp\56743369a3de6059006e421ac67773f6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\56743369a3de6059006e421ac67773f6.exeC:\Users\Admin\AppData\Local\Temp\56743369a3de6059006e421ac67773f6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\56743369a3de6059006e421ac67773f6.exe" /TN QxutJGth3fd4 /F3⤵
- Creates scheduled task(s)
PID:2396
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\GdkDlI.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2784
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5fe746997272ac95715abc4a4252ea464
SHA173f91aaf660ee092dfa2bc027d9bc06ef2aa06c6
SHA2568870f28d08e286fd1ccd21c64850f11867b41282651e3b1ca89a3ee7fdaf3978
SHA5120ce7a9fe7da0279dde594dad3deacd7bf6088b7a1e2737aa8864903c0e98273446a72d5f2e1a6d4f31084e89474c2fc16b118d140c718b614f4ff03ba77fc29e
-
Filesize
26KB
MD5bcf56112939c0ba19461c22973b623df
SHA1c312468975fb067f921b23bd13538af38d9da8ce
SHA2563a7c718fc5398365985c7bf5465bb53d1eb940a15e01856428ad9bf7966d91a7
SHA512cdca75aa79f8b7b822c876dd4b88dedc13a39f3d7b1f24cbd68e4fc38a8d9c2a64d38e2054680007f6d5f92b11a957450f27b9353a00bca8ef8ba3a2063cc112
-
Filesize
1KB
MD5c23364dabfc55327a380119abbde8900
SHA13bc0b09d361ebac5291969e1dbb37c0d49c60e39
SHA2560f3321bb26a6325cb4b41d46f45ad02f90d8fcbc63380e396ca8b083fe5d044e
SHA512b14013952d1338b5ae40bbca04a0f56f977b1cae3cf07e0cf9c8d9f07b81e554f1e3fed5d350b7f2cb63f6347c67eea629de7d2f4e894c4854bf8f6c11b45f9d
-
Filesize
29KB
MD502b5b300b89422c0276a2aaff81ce7c3
SHA13b00104afb2de4cbfa365c7fcf27942031cdb609
SHA25662a3300e385b123d6b1ec498143576337712844db76b065e9a2546157bb5a937
SHA512d2189c38ef8da5d7855c07ae746291fc8e644420d284975b6bf99c750d8bbefa2908d21977db33cd9881f5ce0c545049fe271ff40fd5d7aa899de07771423ee5