Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:43
Behavioral task
behavioral1
Sample
ab2403725503040b8233654423fe6ee0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ab2403725503040b8233654423fe6ee0.exe
Resource
win10v2004-20231215-en
General
-
Target
ab2403725503040b8233654423fe6ee0.exe
-
Size
7.8MB
-
MD5
ab2403725503040b8233654423fe6ee0
-
SHA1
36691647e55dbc5b373b109009999e5bf601a723
-
SHA256
1b2ec655952d27e8ebcd8fdbcc5fb2784bf7977b664e1ccf8b4025226be87630
-
SHA512
62885d5ee65948cfeba7a6de4b7747e87c4b32aa3076b7bd1bb85d7ff061899915d506d77d480a8114b77c64182a99efe85f362caa2f7a8a939889ba577086b1
-
SSDEEP
196608:RHifzLqYhhm5UzLq9MHzLqYhhm5UzLqlNXzLqYhhm5UzLq9MHzLqYhhm5UzLq:RCfzNPzBHzNPz+NXzNPzBHzNPz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 ab2403725503040b8233654423fe6ee0.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 ab2403725503040b8233654423fe6ee0.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 ab2403725503040b8233654423fe6ee0.exe -
resource yara_rule behavioral1/memory/2204-1-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000013a1a-11.dat upx behavioral1/memory/2204-16-0x0000000023E00000-0x000000002405C000-memory.dmp upx behavioral1/files/0x000a000000013a1a-17.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ab2403725503040b8233654423fe6ee0.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 ab2403725503040b8233654423fe6ee0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 ab2403725503040b8233654423fe6ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ab2403725503040b8233654423fe6ee0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 ab2403725503040b8233654423fe6ee0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 ab2403725503040b8233654423fe6ee0.exe 3052 ab2403725503040b8233654423fe6ee0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3052 2204 ab2403725503040b8233654423fe6ee0.exe 29 PID 2204 wrote to memory of 3052 2204 ab2403725503040b8233654423fe6ee0.exe 29 PID 2204 wrote to memory of 3052 2204 ab2403725503040b8233654423fe6ee0.exe 29 PID 2204 wrote to memory of 3052 2204 ab2403725503040b8233654423fe6ee0.exe 29 PID 3052 wrote to memory of 2696 3052 ab2403725503040b8233654423fe6ee0.exe 30 PID 3052 wrote to memory of 2696 3052 ab2403725503040b8233654423fe6ee0.exe 30 PID 3052 wrote to memory of 2696 3052 ab2403725503040b8233654423fe6ee0.exe 30 PID 3052 wrote to memory of 2696 3052 ab2403725503040b8233654423fe6ee0.exe 30 PID 3052 wrote to memory of 2632 3052 ab2403725503040b8233654423fe6ee0.exe 34 PID 3052 wrote to memory of 2632 3052 ab2403725503040b8233654423fe6ee0.exe 34 PID 3052 wrote to memory of 2632 3052 ab2403725503040b8233654423fe6ee0.exe 34 PID 3052 wrote to memory of 2632 3052 ab2403725503040b8233654423fe6ee0.exe 34 PID 2632 wrote to memory of 2612 2632 cmd.exe 33 PID 2632 wrote to memory of 2612 2632 cmd.exe 33 PID 2632 wrote to memory of 2612 2632 cmd.exe 33 PID 2632 wrote to memory of 2612 2632 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab2403725503040b8233654423fe6ee0.exe"C:\Users\Admin\AppData\Local\Temp\ab2403725503040b8233654423fe6ee0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\ab2403725503040b8233654423fe6ee0.exeC:\Users\Admin\AppData\Local\Temp\ab2403725503040b8233654423fe6ee0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ab2403725503040b8233654423fe6ee0.exe" /TN qm2lmOfce5f6 /F3⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\uqPI4oLdp.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2632
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD54d2d521e1d0c845a8e6b66b0caa0f165
SHA1723bba0326a9af5963b527575cdac8a225d36be1
SHA2561373560c215677f0c69ca205205288662921d0843006b810757eb2ea84bf86fc
SHA512b1427b2b66d5f979a63849e7942d1ebf509009d730c6d159e64298fd91cc9be8ccfb9cb4138d1cbdfabc8d2d04a12b760737169826d54ef7fd7d6d45c30d5575
-
Filesize
1KB
MD5accdb13eb8617b0b23abd5fae65788af
SHA10eb25b107ddd4a18e9d9da4fec486a83c0b3ead2
SHA256750b8802375fc072cf65bb62c090d220116545aed0bc6af928c6ba533b9d4e44
SHA5128e9a6c72d0595fdfeac4969b2f9f74a03e270d1775282c866a85a00ba09b43b8e92a4d0bb51474c6cfeb3e549b33eae96fc67ddd4b1caacf4a93dcb12fa9aa5e
-
Filesize
360KB
MD55f11f694504da328eafbdf0acbcc9385
SHA131fe44881c20232458576968f189538bbd2198cf
SHA2569d3bc348976c1c7fc2b3e506675a17b5331451468f6c3f82ed82fcf3b12ebb63
SHA5127b7d53a5a558fa8028687e0c5dd71264c709c391432bd54606c8d51ae30ed8d0a881b1c60ffc197cb85c374345963961a019d804577085119397988ee551a102