Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:07
Behavioral task
behavioral1
Sample
98d89d871a15023038b2218c53984a5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98d89d871a15023038b2218c53984a5d.exe
Resource
win10v2004-20231215-en
General
-
Target
98d89d871a15023038b2218c53984a5d.exe
-
Size
1.5MB
-
MD5
98d89d871a15023038b2218c53984a5d
-
SHA1
3fe8e8f0600412c494654f07eaf939f60a0eb046
-
SHA256
8b4fb22ed06edb618d1e5308e094ffc6022335946c448307755b0e118245e2c8
-
SHA512
051400b5bb2855ace023a445d32d1379759757d0307bacf5dbf45aa7a94b88e252d04f6b61e9f8657fdcf2a022416ee41bb5b81b67182766e379b6fb6b8caed3
-
SSDEEP
24576:36eE4F5E/a+UeFGKtcjukL2siyBpukruJ3Z6T6DqGUUstcjukL2Y:3ZF5D+USxcakLhukrCZ6T6GfUstcakLj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1444 98d89d871a15023038b2218c53984a5d.exe -
Executes dropped EXE 1 IoCs
pid Process 1444 98d89d871a15023038b2218c53984a5d.exe -
Loads dropped DLL 1 IoCs
pid Process 2612 98d89d871a15023038b2218c53984a5d.exe -
resource yara_rule behavioral1/memory/2612-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012256-11.dat upx behavioral1/memory/2612-16-0x0000000023020000-0x000000002327C000-memory.dmp upx behavioral1/memory/1444-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012256-17.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 98d89d871a15023038b2218c53984a5d.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 98d89d871a15023038b2218c53984a5d.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 98d89d871a15023038b2218c53984a5d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 98d89d871a15023038b2218c53984a5d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2612 98d89d871a15023038b2218c53984a5d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2612 98d89d871a15023038b2218c53984a5d.exe 1444 98d89d871a15023038b2218c53984a5d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2612 wrote to memory of 1444 2612 98d89d871a15023038b2218c53984a5d.exe 29 PID 2612 wrote to memory of 1444 2612 98d89d871a15023038b2218c53984a5d.exe 29 PID 2612 wrote to memory of 1444 2612 98d89d871a15023038b2218c53984a5d.exe 29 PID 2612 wrote to memory of 1444 2612 98d89d871a15023038b2218c53984a5d.exe 29 PID 1444 wrote to memory of 2756 1444 98d89d871a15023038b2218c53984a5d.exe 30 PID 1444 wrote to memory of 2756 1444 98d89d871a15023038b2218c53984a5d.exe 30 PID 1444 wrote to memory of 2756 1444 98d89d871a15023038b2218c53984a5d.exe 30 PID 1444 wrote to memory of 2756 1444 98d89d871a15023038b2218c53984a5d.exe 30 PID 1444 wrote to memory of 2680 1444 98d89d871a15023038b2218c53984a5d.exe 32 PID 1444 wrote to memory of 2680 1444 98d89d871a15023038b2218c53984a5d.exe 32 PID 1444 wrote to memory of 2680 1444 98d89d871a15023038b2218c53984a5d.exe 32 PID 1444 wrote to memory of 2680 1444 98d89d871a15023038b2218c53984a5d.exe 32 PID 2680 wrote to memory of 2660 2680 cmd.exe 34 PID 2680 wrote to memory of 2660 2680 cmd.exe 34 PID 2680 wrote to memory of 2660 2680 cmd.exe 34 PID 2680 wrote to memory of 2660 2680 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d89d871a15023038b2218c53984a5d.exe"C:\Users\Admin\AppData\Local\Temp\98d89d871a15023038b2218c53984a5d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\98d89d871a15023038b2218c53984a5d.exeC:\Users\Admin\AppData\Local\Temp\98d89d871a15023038b2218c53984a5d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\98d89d871a15023038b2218c53984a5d.exe" /TN x1iLRz9v069a /F3⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN x1iLRz9v069a > C:\Users\Admin\AppData\Local\Temp\gvtn02d1.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN x1iLRz9v069a4⤵PID:2660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD52ce2806e6358b26014b81e6305bef946
SHA1c414b4035a0759814e5c5d0abc753665fb9e8382
SHA2562a9117745f8e872357f7e4b5d926c002c2c73746b16bf8192654434a81e2e352
SHA512ea15068cfe1ebdfb7fefe74531c954824e996f79f7e6a5b96813f53d04ee5ec09b399eb81239bc8766e1ff12045290a0b58d7fcb1664204a45244d7a3c0a334c
-
Filesize
1KB
MD577d86da4bf1ebbd2d342b5abefc8c5f0
SHA1d2b1a744cdea556e53fb1c6704331e1e443da4d7
SHA25664f2a8446e50d91f6c5509daf95deeadf6a05bc010fc65e7712c5caddeb4f6d5
SHA5124d12771d774f86bdb426bd1ad32d1174e726a64e864fc96aa316b934259d14d4c57ef144831bb9ad873710cc0fd5a821f0e07cba189e60137a3d743e0fc8908d
-
Filesize
64KB
MD5f2b737b422a7fdd7ee05095e3d6eaab1
SHA19f1b596aa95bce984e3bc0f0d7dd432938746926
SHA25686f2d1abdeff2b7ad86e1c36448f8af8a6a47bfc8dfa768d2294d8fd58f77807
SHA5123971959130c5520e80397af1b1f2159e55626aeeadd4e998968f7fac0d1ad2414b35d7e7b321bcc9f65f9350401e117bc05c07f8f12a4522ed2ce92332a84baa