Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:37
Behavioral task
behavioral1
Sample
db4139d94861a77cfc61f7bb866982cb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
db4139d94861a77cfc61f7bb866982cb.exe
Resource
win10v2004-20231215-en
General
-
Target
db4139d94861a77cfc61f7bb866982cb.exe
-
Size
3.9MB
-
MD5
db4139d94861a77cfc61f7bb866982cb
-
SHA1
8c94f9546890b8bd86e1eb20844a45b6bc9cc1c3
-
SHA256
a1aa501b52ec4b988f1ff49178a46e5473a6de9dba4fa4dadcaa5f35a46c6eb6
-
SHA512
f9f901bfae5e61eb42c1325e0394eeb0be02bf2e7f960df7d1b605727ad21b023d30dac8c07bc4bc0f55554ba8c5f3a9a1c46bf93e00b11b352a23962c68f5dd
-
SSDEEP
98304:t9e92qHRGCA9zyULG+GkDQH2uyA9zyULG+2ZYc7pf4OOXA9zyULG+GkDQH2uyA9V:Cc6GzzLqcEH2QzLq77l4wzLqcEH2QzLq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 db4139d94861a77cfc61f7bb866982cb.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 db4139d94861a77cfc61f7bb866982cb.exe -
Loads dropped DLL 1 IoCs
pid Process 2860 db4139d94861a77cfc61f7bb866982cb.exe -
resource yara_rule behavioral1/memory/2860-1-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b0000000139e0-11.dat upx behavioral1/memory/2860-16-0x0000000023630000-0x000000002388C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3064 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 db4139d94861a77cfc61f7bb866982cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 db4139d94861a77cfc61f7bb866982cb.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 db4139d94861a77cfc61f7bb866982cb.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 db4139d94861a77cfc61f7bb866982cb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2860 db4139d94861a77cfc61f7bb866982cb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2860 db4139d94861a77cfc61f7bb866982cb.exe 2332 db4139d94861a77cfc61f7bb866982cb.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2332 2860 db4139d94861a77cfc61f7bb866982cb.exe 29 PID 2860 wrote to memory of 2332 2860 db4139d94861a77cfc61f7bb866982cb.exe 29 PID 2860 wrote to memory of 2332 2860 db4139d94861a77cfc61f7bb866982cb.exe 29 PID 2860 wrote to memory of 2332 2860 db4139d94861a77cfc61f7bb866982cb.exe 29 PID 2332 wrote to memory of 3064 2332 db4139d94861a77cfc61f7bb866982cb.exe 30 PID 2332 wrote to memory of 3064 2332 db4139d94861a77cfc61f7bb866982cb.exe 30 PID 2332 wrote to memory of 3064 2332 db4139d94861a77cfc61f7bb866982cb.exe 30 PID 2332 wrote to memory of 3064 2332 db4139d94861a77cfc61f7bb866982cb.exe 30 PID 2332 wrote to memory of 2508 2332 db4139d94861a77cfc61f7bb866982cb.exe 34 PID 2332 wrote to memory of 2508 2332 db4139d94861a77cfc61f7bb866982cb.exe 34 PID 2332 wrote to memory of 2508 2332 db4139d94861a77cfc61f7bb866982cb.exe 34 PID 2332 wrote to memory of 2508 2332 db4139d94861a77cfc61f7bb866982cb.exe 34 PID 2508 wrote to memory of 2604 2508 cmd.exe 33 PID 2508 wrote to memory of 2604 2508 cmd.exe 33 PID 2508 wrote to memory of 2604 2508 cmd.exe 33 PID 2508 wrote to memory of 2604 2508 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\db4139d94861a77cfc61f7bb866982cb.exe"C:\Users\Admin\AppData\Local\Temp\db4139d94861a77cfc61f7bb866982cb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\db4139d94861a77cfc61f7bb866982cb.exeC:\Users\Admin\AppData\Local\Temp\db4139d94861a77cfc61f7bb866982cb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\db4139d94861a77cfc61f7bb866982cb.exe" /TN 6ek6uOO9da42 /F3⤵
- Creates scheduled task(s)
PID:3064
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\ISEtZQiFo.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2508
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da421⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51a473a7ff961850d565039e1ba5ad0a9
SHA1b9f0bb4cd464e4ba10ab4836297d7a102037282d
SHA2568cf13fdd1fd6e6b71d2262006e28a07470cac4a1db4a2d52e6a99da75ea74368
SHA512579bf8d927e2bc8e6caaf1d245adfe96ffbbc48eced9265a000e43d403e64a127fbd891005e61739855104bfece5379e77831e07a33d19a6e26dfefb9f54825f