Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 14:22
Behavioral task
behavioral1
Sample
bf0232bab901b8931a5687ae9f427eec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bf0232bab901b8931a5687ae9f427eec.exe
Resource
win10v2004-20231215-en
General
-
Target
bf0232bab901b8931a5687ae9f427eec.exe
-
Size
3.9MB
-
MD5
bf0232bab901b8931a5687ae9f427eec
-
SHA1
f6ba85bde4e26e6168083b0b5be26e769c6fa257
-
SHA256
b41cb756467359c4875db259a29ac872f2b2bf4d1ceb510d831bfae53afddc39
-
SHA512
4bdc760b28e6620e289f24a1336f8e6c45e7103cd9862e135bd0640c7e65afefa0428136a72a3b13166229b43d36a203a6fa3d65c41e6e3072bc581c2df445da
-
SSDEEP
98304:vX6krN2cakcibiqhsEsKdQwPrmcakcibiqha3c58JhMczeQcakcibiqhsEsKdQwb:PSdlir3sLwDmdlir83cCactdlir3sLwd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1372 bf0232bab901b8931a5687ae9f427eec.exe -
Executes dropped EXE 1 IoCs
pid Process 1372 bf0232bab901b8931a5687ae9f427eec.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 bf0232bab901b8931a5687ae9f427eec.exe -
resource yara_rule behavioral1/memory/2212-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012238-11.dat upx behavioral1/files/0x000a000000012238-14.dat upx behavioral1/memory/2212-16-0x0000000023600000-0x000000002385C000-memory.dmp upx behavioral1/memory/1372-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 bf0232bab901b8931a5687ae9f427eec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 bf0232bab901b8931a5687ae9f427eec.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 bf0232bab901b8931a5687ae9f427eec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 bf0232bab901b8931a5687ae9f427eec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2212 bf0232bab901b8931a5687ae9f427eec.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2212 bf0232bab901b8931a5687ae9f427eec.exe 1372 bf0232bab901b8931a5687ae9f427eec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1372 2212 bf0232bab901b8931a5687ae9f427eec.exe 29 PID 2212 wrote to memory of 1372 2212 bf0232bab901b8931a5687ae9f427eec.exe 29 PID 2212 wrote to memory of 1372 2212 bf0232bab901b8931a5687ae9f427eec.exe 29 PID 2212 wrote to memory of 1372 2212 bf0232bab901b8931a5687ae9f427eec.exe 29 PID 1372 wrote to memory of 2808 1372 bf0232bab901b8931a5687ae9f427eec.exe 30 PID 1372 wrote to memory of 2808 1372 bf0232bab901b8931a5687ae9f427eec.exe 30 PID 1372 wrote to memory of 2808 1372 bf0232bab901b8931a5687ae9f427eec.exe 30 PID 1372 wrote to memory of 2808 1372 bf0232bab901b8931a5687ae9f427eec.exe 30 PID 1372 wrote to memory of 2804 1372 bf0232bab901b8931a5687ae9f427eec.exe 32 PID 1372 wrote to memory of 2804 1372 bf0232bab901b8931a5687ae9f427eec.exe 32 PID 1372 wrote to memory of 2804 1372 bf0232bab901b8931a5687ae9f427eec.exe 32 PID 1372 wrote to memory of 2804 1372 bf0232bab901b8931a5687ae9f427eec.exe 32 PID 2804 wrote to memory of 2752 2804 cmd.exe 34 PID 2804 wrote to memory of 2752 2804 cmd.exe 34 PID 2804 wrote to memory of 2752 2804 cmd.exe 34 PID 2804 wrote to memory of 2752 2804 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf0232bab901b8931a5687ae9f427eec.exe"C:\Users\Admin\AppData\Local\Temp\bf0232bab901b8931a5687ae9f427eec.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\bf0232bab901b8931a5687ae9f427eec.exeC:\Users\Admin\AppData\Local\Temp\bf0232bab901b8931a5687ae9f427eec.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bf0232bab901b8931a5687ae9f427eec.exe" /TN BSpsfata099d /F3⤵
- Creates scheduled task(s)
PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN BSpsfata099d > C:\Users\Admin\AppData\Local\Temp\rxXmbKh.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN BSpsfata099d4⤵PID:2752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD58980f0605bb4bf704a82be0527be36c0
SHA1f0b8fa2a0a6b828befa0054c60045faeab25f347
SHA2564f9cbeea1e3058f33bab0a07cfe01320897e7b7fa10189bf9ac25c4d43e2ab71
SHA512078be83b41a6cb4b9a947f6c4aa1153bdbe21f8c099654852b56a295dd57c6bf18f1dda5fefb0bf586c4f191c44cadb3b8a4e3415a2abcfae96ef23001b2eb9e
-
Filesize
1KB
MD53c82a1b52db7d8ee8b038013b9d1504b
SHA18813d3451eea79a3442dc00a73a7e4ae0f167721
SHA256229696dd24619ab422ca7c7f50aec024a44478ec828031a6928a50cd967e2208
SHA5120bb2424b9bd4635893bbb52b89b30f3e00a13350726ded18923173987b163d989fe00e440aeb4b5d32a42f718e5fb0bcecde458318e881bbc032b8991889dab2
-
Filesize
128KB
MD5e64a093260914f038da363e52949a107
SHA1659190532ea5b8c7e76de1b43c082e4783f93082
SHA2565c07c3d752ea22d823e4068bfd82d1081902b606ada8b094a0e89351bc0f1b38
SHA51236a8f1692d44529a1e0d2921fc7112ffa4d9298d4fd41fdf94ec6a248461bcab3017ac8ae8ccd07fd1fac9b7f79df47b055cf0d3287f282163b53793ac279cd3