Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:52
Behavioral task
behavioral1
Sample
b0369a7c6f2eb2db78064f2e8519acf0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b0369a7c6f2eb2db78064f2e8519acf0.exe
Resource
win10v2004-20231215-en
General
-
Target
b0369a7c6f2eb2db78064f2e8519acf0.exe
-
Size
1.6MB
-
MD5
b0369a7c6f2eb2db78064f2e8519acf0
-
SHA1
5454c0378d181bd0734b9b6064568c8207671369
-
SHA256
f58a33fab1c4bf18693ddf791a4c94ebde13cb2881b3464a8392b871042779a1
-
SHA512
443d017e47f79760a479e4a55a927a145651a46d31f890bfcf5315bff083805f7f91713a0fc9d8360e995b42cd6bbeaf7c77116b3475b7d8794481dbdad593d7
-
SSDEEP
49152:j2bjJtKOwSoX0rcakLz0LjHvnkgsCl2T+66UDcakLz0O:j2bjDVwSO0rcakcLjHvnk/CkT+66UDcp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 b0369a7c6f2eb2db78064f2e8519acf0.exe -
resource yara_rule behavioral1/memory/2248-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012287-11.dat upx behavioral1/memory/2248-13-0x0000000023180000-0x00000000233DC000-memory.dmp upx behavioral1/files/0x000a000000012287-17.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2936 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b0369a7c6f2eb2db78064f2e8519acf0.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 b0369a7c6f2eb2db78064f2e8519acf0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 b0369a7c6f2eb2db78064f2e8519acf0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 b0369a7c6f2eb2db78064f2e8519acf0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2248 b0369a7c6f2eb2db78064f2e8519acf0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2248 b0369a7c6f2eb2db78064f2e8519acf0.exe 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2692 2248 b0369a7c6f2eb2db78064f2e8519acf0.exe 28 PID 2248 wrote to memory of 2692 2248 b0369a7c6f2eb2db78064f2e8519acf0.exe 28 PID 2248 wrote to memory of 2692 2248 b0369a7c6f2eb2db78064f2e8519acf0.exe 28 PID 2248 wrote to memory of 2692 2248 b0369a7c6f2eb2db78064f2e8519acf0.exe 28 PID 2692 wrote to memory of 2936 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 30 PID 2692 wrote to memory of 2936 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 30 PID 2692 wrote to memory of 2936 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 30 PID 2692 wrote to memory of 2936 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 30 PID 2692 wrote to memory of 2940 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 31 PID 2692 wrote to memory of 2940 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 31 PID 2692 wrote to memory of 2940 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 31 PID 2692 wrote to memory of 2940 2692 b0369a7c6f2eb2db78064f2e8519acf0.exe 31 PID 2940 wrote to memory of 3036 2940 cmd.exe 33 PID 2940 wrote to memory of 3036 2940 cmd.exe 33 PID 2940 wrote to memory of 3036 2940 cmd.exe 33 PID 2940 wrote to memory of 3036 2940 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0369a7c6f2eb2db78064f2e8519acf0.exe"C:\Users\Admin\AppData\Local\Temp\b0369a7c6f2eb2db78064f2e8519acf0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\b0369a7c6f2eb2db78064f2e8519acf0.exeC:\Users\Admin\AppData\Local\Temp\b0369a7c6f2eb2db78064f2e8519acf0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b0369a7c6f2eb2db78064f2e8519acf0.exe" /TN m8v9k5kD0c8e /F3⤵
- Creates scheduled task(s)
PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN m8v9k5kD0c8e > C:\Users\Admin\AppData\Local\Temp\RbnNC3N.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN m8v9k5kD0c8e4⤵PID:3036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD535b314826eb343520c3ff1634592387b
SHA12332eed51ad105aa67f6ad1ab70b058a61af0149
SHA256a0e10fb06b8819453e62268aeeb26a8156e3bd0f71a1c6986726589d69acb2fa
SHA512d2cf46a4706bec5d436e4172ef7d6a2aadbc6059e5f5bf9333e707d922cf08f4e951d38cd031e4764893eed4563ba1be7c92bb349b19954acdca1c4cb7cfd9c9
-
Filesize
273KB
MD51dcfb9a881219602774df1157ac837d4
SHA100586e2fcc9bac7bd5015b7cce0843d12844f9a9
SHA2561ef48a3747696a69ccf8e72450c7dfcff3dc649a5c7e890ea54336cc4911eec4
SHA512c32fa65c78621f26f9e4b5e1f3e5f600f96e21dbc01da27b7586ad1b6f2427fdcaad54a18038c20addbd55d12a3f55b798cbc4e870207ed4acd31579fa3d2008
-
Filesize
208KB
MD5f5140be4a0941bd67398e5129211d2a5
SHA1047928b156baca46d40164b8ccda0dee1f02632d
SHA256feeab34785b5a6ec7f92fb7535ecf08a72a8abf042eadd4c4c0f6a06a24dc6c3
SHA5120ca7a10f7e4b7c05bee44eacff8682367d34f6274eec0fce49052a6055e573645e75730a85a15319b9671d61335216ec6464d2f15b63410efef505003adf32d7