Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:58
Behavioral task
behavioral1
Sample
b37f0ed927e76d97884011930eb6d3ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b37f0ed927e76d97884011930eb6d3ac.exe
Resource
win10v2004-20231215-en
General
-
Target
b37f0ed927e76d97884011930eb6d3ac.exe
-
Size
1.6MB
-
MD5
b37f0ed927e76d97884011930eb6d3ac
-
SHA1
429265d57ee336e6f320d89136d8d0d34853b66c
-
SHA256
64c58b3f36b25fb172500f0b4b8b2cb4954b078efb480db1054b64fc8d08c7cc
-
SHA512
f0a3cd0d6ff3067f99f85966909dfe3f69a0200cdcc77e574416de7832bf64ba491239718b1cd93390aca2a6a82e9126c667bcbf4d9e260922a09b3eeaad2439
-
SSDEEP
49152:B3uL8oZU+dESBqcakLz0NZo8GEKRK6AUEcakLz0O:BeooU+dESBqcakcNS8nKRK61EcakcO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 b37f0ed927e76d97884011930eb6d3ac.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 b37f0ed927e76d97884011930eb6d3ac.exe -
Loads dropped DLL 1 IoCs
pid Process 1672 b37f0ed927e76d97884011930eb6d3ac.exe -
resource yara_rule behavioral1/memory/1672-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001223b-11.dat upx behavioral1/files/0x000a00000001223b-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 b37f0ed927e76d97884011930eb6d3ac.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 b37f0ed927e76d97884011930eb6d3ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 b37f0ed927e76d97884011930eb6d3ac.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b37f0ed927e76d97884011930eb6d3ac.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1672 b37f0ed927e76d97884011930eb6d3ac.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1672 b37f0ed927e76d97884011930eb6d3ac.exe 2760 b37f0ed927e76d97884011930eb6d3ac.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2760 1672 b37f0ed927e76d97884011930eb6d3ac.exe 20 PID 1672 wrote to memory of 2760 1672 b37f0ed927e76d97884011930eb6d3ac.exe 20 PID 1672 wrote to memory of 2760 1672 b37f0ed927e76d97884011930eb6d3ac.exe 20 PID 1672 wrote to memory of 2760 1672 b37f0ed927e76d97884011930eb6d3ac.exe 20 PID 2760 wrote to memory of 2756 2760 b37f0ed927e76d97884011930eb6d3ac.exe 18 PID 2760 wrote to memory of 2756 2760 b37f0ed927e76d97884011930eb6d3ac.exe 18 PID 2760 wrote to memory of 2756 2760 b37f0ed927e76d97884011930eb6d3ac.exe 18 PID 2760 wrote to memory of 2756 2760 b37f0ed927e76d97884011930eb6d3ac.exe 18 PID 2760 wrote to memory of 2844 2760 b37f0ed927e76d97884011930eb6d3ac.exe 34 PID 2760 wrote to memory of 2844 2760 b37f0ed927e76d97884011930eb6d3ac.exe 34 PID 2760 wrote to memory of 2844 2760 b37f0ed927e76d97884011930eb6d3ac.exe 34 PID 2760 wrote to memory of 2844 2760 b37f0ed927e76d97884011930eb6d3ac.exe 34 PID 2844 wrote to memory of 2592 2844 cmd.exe 33 PID 2844 wrote to memory of 2592 2844 cmd.exe 33 PID 2844 wrote to memory of 2592 2844 cmd.exe 33 PID 2844 wrote to memory of 2592 2844 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b37f0ed927e76d97884011930eb6d3ac.exe"C:\Users\Admin\AppData\Local\Temp\b37f0ed927e76d97884011930eb6d3ac.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\b37f0ed927e76d97884011930eb6d3ac.exeC:\Users\Admin\AppData\Local\Temp\b37f0ed927e76d97884011930eb6d3ac.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\pOycVPjrV.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2844
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b37f0ed927e76d97884011930eb6d3ac.exe" /TN uhTCmbCqd877 /F1⤵
- Creates scheduled task(s)
PID:2756
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uhTCmbCqd8771⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD58db24fb4f435676a68bb329b5b125ac2
SHA114c4a328b8b6bcb3c4d80577f6ad35dbb577b7fa
SHA256c5a0779a813c5b98183dcd548cebae3cb0cc2cc60762e0e30d79a16a2887aca5
SHA512a8a7c3164e99c2fec43a7730782c58aa75af942536885659de02d4e64c2529d1961c4256c881cbf442586cc7c44c63a411b764231f153aedb4b7bab7dee3c17d
-
Filesize
1KB
MD567b46c448887cd66178beb111c2c9c0b
SHA101ff36ec0b2d5d9d8b6f05e05fae4a00b7cf7380
SHA2565ab1ab45f4b541f56aedcc64bab8e1c6749a82d72b3a538cc0b4ca17140772b2
SHA512488e80d5ab3135fd55f683874c7303462625593347a09360609b69b8e98757fe0e74eb924bfbb5e6f647bbcd415f3593f046668aab5518f96d916c6aae6bafd4
-
Filesize
12KB
MD586872dc159ddee6ff129031f9e47f57d
SHA107ad4f50bdab3394ea8dead13bc5f7aa4b90ed1e
SHA25603f701d85feddb8aac06a939733b9c810fc3acd8bc54c4227870b6f409d72f0b
SHA5128b5821a6b7c718f2f490da440c41f371e3fc7914f6fbf383361e976aa26eb0a67c7764e142b506f96637927640b1ed70e6580c33725b4159b26e92721a7b177d