Analysis
-
max time kernel
120s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 04:30
Behavioral task
behavioral1
Sample
645ecaab26ad34e4c3d2c39d610e8fdb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
645ecaab26ad34e4c3d2c39d610e8fdb.exe
Resource
win10v2004-20231215-en
General
-
Target
645ecaab26ad34e4c3d2c39d610e8fdb.exe
-
Size
2.0MB
-
MD5
645ecaab26ad34e4c3d2c39d610e8fdb
-
SHA1
c254fc513cdd1f1406d046584dc18a532cd9da44
-
SHA256
9cf32533559d5bb9b96da3f2054dd8b21ec0e0a53087c7c422f78e5ce3ded930
-
SHA512
1e524b14c2212781162d23b69db29f20a07a09e6a3c7f3e9ebb93dddba6a55174b78161b257e9c4df41ea0271ea40334b36a95b0e23d493163e561e86f445247
-
SSDEEP
49152:3rWhHrLZK7WNX/udodLJlb+7Zpk6IOtuRHZlFtIudodLJlb+7Zpk6IOtuR:7WNrLZ8WNWd8Lzb+7ZpkwtuhrFtLd8L7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe -
Loads dropped DLL 1 IoCs
pid Process 2900 645ecaab26ad34e4c3d2c39d610e8fdb.exe -
resource yara_rule behavioral1/memory/2900-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0004000000004ed7-16.dat upx behavioral1/files/0x0004000000004ed7-12.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2980 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 645ecaab26ad34e4c3d2c39d610e8fdb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 645ecaab26ad34e4c3d2c39d610e8fdb.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 645ecaab26ad34e4c3d2c39d610e8fdb.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 645ecaab26ad34e4c3d2c39d610e8fdb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 645ecaab26ad34e4c3d2c39d610e8fdb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2900 645ecaab26ad34e4c3d2c39d610e8fdb.exe 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1364 2900 645ecaab26ad34e4c3d2c39d610e8fdb.exe 30 PID 2900 wrote to memory of 1364 2900 645ecaab26ad34e4c3d2c39d610e8fdb.exe 30 PID 2900 wrote to memory of 1364 2900 645ecaab26ad34e4c3d2c39d610e8fdb.exe 30 PID 2900 wrote to memory of 1364 2900 645ecaab26ad34e4c3d2c39d610e8fdb.exe 30 PID 1364 wrote to memory of 2980 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 31 PID 1364 wrote to memory of 2980 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 31 PID 1364 wrote to memory of 2980 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 31 PID 1364 wrote to memory of 2980 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 31 PID 1364 wrote to memory of 3040 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 33 PID 1364 wrote to memory of 3040 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 33 PID 1364 wrote to memory of 3040 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 33 PID 1364 wrote to memory of 3040 1364 645ecaab26ad34e4c3d2c39d610e8fdb.exe 33 PID 3040 wrote to memory of 1488 3040 cmd.exe 34 PID 3040 wrote to memory of 1488 3040 cmd.exe 34 PID 3040 wrote to memory of 1488 3040 cmd.exe 34 PID 3040 wrote to memory of 1488 3040 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\645ecaab26ad34e4c3d2c39d610e8fdb.exe"C:\Users\Admin\AppData\Local\Temp\645ecaab26ad34e4c3d2c39d610e8fdb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\645ecaab26ad34e4c3d2c39d610e8fdb.exeC:\Users\Admin\AppData\Local\Temp\645ecaab26ad34e4c3d2c39d610e8fdb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\645ecaab26ad34e4c3d2c39d610e8fdb.exe" /TN x1iLRz9v069a /F3⤵
- Creates scheduled task(s)
PID:2980
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN x1iLRz9v069a > C:\Users\Admin\AppData\Local\Temp\jI8HQe.xml3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN x1iLRz9v069a4⤵PID:1488
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5cdd1288763b2e5eb39c2059a034a9d2e
SHA143f32ddbd6e123f42326ad3c7e5de50e482b81d9
SHA2561d5082c8a1d4ecfee13d3c38c2ccadffba5dc69ec2b0d82f440d50e4ea360653
SHA51288a5c967131750b59baa672d73cf5168ff28f0ce008ae9197c99a3572034183f403d6a5f00e5bde383fb07baa8d13ac556ad48bcc7e9c2994d455fa3c50a56fd
-
Filesize
1KB
MD5eb80e1f0dfa6b8434660e2e67594a3f8
SHA19f95d946832e32b694818b02eec731290164e471
SHA2565067f333e95847ec17392b2e6362bbd7a6ac4566cb33979264a096978ae88249
SHA512048380011c158d83bf5d8d035e916695d63e2b215f1dc0418e681c8bdf84a17d31bc8e5b70e8d3377287afe6c14a8e58d690be93305e80e981cafb93a1e845c0
-
Filesize
2.0MB
MD50bd62c63f1dd4b62b7a8344a75d4f522
SHA1a73b348d5aafbc0be9d08fdee395857d43abff42
SHA25631f39390be15aa8443c9b4a1368a600567d801d0f648589e655a4022337a833c
SHA512066bb3eccdaa2999db3a0614aa3a12db99c93cd1bb84ae2d5774f51027a305fb3fe1f8b5b34903c13b9c296be476fab1a0794617d096d275785ef3c85a146441