Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 05:02
Behavioral task
behavioral1
Sample
6d2620314cd5dc068cf0325b44ef5a27.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d2620314cd5dc068cf0325b44ef5a27.exe
Resource
win10v2004-20231215-en
General
-
Target
6d2620314cd5dc068cf0325b44ef5a27.exe
-
Size
1.6MB
-
MD5
6d2620314cd5dc068cf0325b44ef5a27
-
SHA1
7c18be28044b656267fa5466e354eb6dca13a9c1
-
SHA256
6473ac10290b6e72337abfec95f64d94dd1e8ca4d6e85b6c50bdc0d0a54bfd17
-
SHA512
02d492f0d099a9ffe338357eee26fd5d31f2d92d664171c3ba704a4258161fc84282e991be8ab32f99edbe616c2b7920de99bc83ffc3272162cd5658bf0301d3
-
SSDEEP
49152:4csJnfUcCQ6cakLz0Tdl5bVQNK7cakLz0O:4vJnfUcCQ6cakcTdzVQNK7cakcO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 6d2620314cd5dc068cf0325b44ef5a27.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 6d2620314cd5dc068cf0325b44ef5a27.exe -
Loads dropped DLL 1 IoCs
pid Process 2220 6d2620314cd5dc068cf0325b44ef5a27.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000015cfa-11.dat upx behavioral1/files/0x000b000000015cfa-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 6d2620314cd5dc068cf0325b44ef5a27.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 6d2620314cd5dc068cf0325b44ef5a27.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 6d2620314cd5dc068cf0325b44ef5a27.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 6d2620314cd5dc068cf0325b44ef5a27.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 6d2620314cd5dc068cf0325b44ef5a27.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2220 6d2620314cd5dc068cf0325b44ef5a27.exe 3032 6d2620314cd5dc068cf0325b44ef5a27.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3032 2220 6d2620314cd5dc068cf0325b44ef5a27.exe 29 PID 2220 wrote to memory of 3032 2220 6d2620314cd5dc068cf0325b44ef5a27.exe 29 PID 2220 wrote to memory of 3032 2220 6d2620314cd5dc068cf0325b44ef5a27.exe 29 PID 2220 wrote to memory of 3032 2220 6d2620314cd5dc068cf0325b44ef5a27.exe 29 PID 3032 wrote to memory of 2644 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 31 PID 3032 wrote to memory of 2644 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 31 PID 3032 wrote to memory of 2644 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 31 PID 3032 wrote to memory of 2644 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 31 PID 3032 wrote to memory of 2692 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 34 PID 3032 wrote to memory of 2692 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 34 PID 3032 wrote to memory of 2692 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 34 PID 3032 wrote to memory of 2692 3032 6d2620314cd5dc068cf0325b44ef5a27.exe 34 PID 2692 wrote to memory of 2568 2692 cmd.exe 32 PID 2692 wrote to memory of 2568 2692 cmd.exe 32 PID 2692 wrote to memory of 2568 2692 cmd.exe 32 PID 2692 wrote to memory of 2568 2692 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe"C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exeC:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe" /TN qm2lmOfce5f6 /F3⤵
- Creates scheduled task(s)
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\Ddmse8.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2692
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725KB
MD558ab314c21a1d9882308bb5c98ba02ed
SHA1fd45494774880ffc0ff37efd77b5539035d0134f
SHA2567d284b48ed8de651fec8ae957bdbbfa0ac3fb243d004991cde96c5aaf2783a9f
SHA512bd06dd60d06d90161204003800690a96f3fd77a951af769d8e9d6c64eab20cb72298812f2dc440375fea5db659d7cee9db7345e052939d4a8df7b6a6fbd7683f
-
Filesize
1KB
MD5ca94368193ecc714aec83da87a2c0e9b
SHA134fbb73f71f58c5932ca1cdbf4f274c6546b665d
SHA2567d0b9817cad089c4616a292dc75e60159397e4e14b922d965e1e3be45c22a5b6
SHA5122bfe36464292b11ce557e5834949a5dd0c204a502bc741433f1334347b14f81791dd36c7f5515ef9a93bf999901526e1f435248e0191bc35f69ff20d400f15e8
-
Filesize
1016KB
MD543170c7da223a68c95dd721ecd8ab115
SHA17326c279141c69de5f1c9228f2419901783f9a90
SHA2562d274a9fa244b2c9a8776a7394acd9fc6d4a7a734f492eb5efe7596b7daab126
SHA5129efc2d3770c3a291f23bb2c27c934a4c8c9e6f835329049a89048c39f7991d82d58dc0417fd2f42c5073e6724d458e259c9649f431d51d913b06c62ef2089477