Analysis
-
max time kernel
5s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:01
Behavioral task
behavioral1
Sample
d129e79afa5288fa3a38a3eb91d66ade.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d129e79afa5288fa3a38a3eb91d66ade.exe
Resource
win10v2004-20231215-en
General
-
Target
d129e79afa5288fa3a38a3eb91d66ade.exe
-
Size
3.9MB
-
MD5
d129e79afa5288fa3a38a3eb91d66ade
-
SHA1
ec3c53866036ff8c8db1386c57e1f90a4492ee2b
-
SHA256
79a47b8279c3fb4e4c9bf524b078301037c8c509146bd88f6e29580f6bd38953
-
SHA512
3c106297add94645b8b2fc1f4db12366143be59baefa39e1c6f384341f6eba042511694f66ebf41c2fc48dbc7cde95446bac7bffbf20ca0e75f7847691f51dd7
-
SSDEEP
98304:usfND1rs3GgJyXUWGzVee/Vo6eNgJyXUWGCXGb/7mNJyXUWGzVee/Vo6eNgJyXUZ:NjEzZzse/Vo6zZCXg/CbzZzse/Vo6zZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2256 d129e79afa5288fa3a38a3eb91d66ade.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 d129e79afa5288fa3a38a3eb91d66ade.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 d129e79afa5288fa3a38a3eb91d66ade.exe -
resource yara_rule behavioral1/memory/3012-1-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001224d-11.dat upx behavioral1/files/0x000b00000001224d-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 d129e79afa5288fa3a38a3eb91d66ade.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3012 d129e79afa5288fa3a38a3eb91d66ade.exe 2256 d129e79afa5288fa3a38a3eb91d66ade.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2256 3012 d129e79afa5288fa3a38a3eb91d66ade.exe 17 PID 3012 wrote to memory of 2256 3012 d129e79afa5288fa3a38a3eb91d66ade.exe 17 PID 3012 wrote to memory of 2256 3012 d129e79afa5288fa3a38a3eb91d66ade.exe 17 PID 3012 wrote to memory of 2256 3012 d129e79afa5288fa3a38a3eb91d66ade.exe 17 PID 2256 wrote to memory of 2696 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 21 PID 2256 wrote to memory of 2696 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 21 PID 2256 wrote to memory of 2696 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 21 PID 2256 wrote to memory of 2696 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 21 PID 2256 wrote to memory of 2828 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 25 PID 2256 wrote to memory of 2828 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 25 PID 2256 wrote to memory of 2828 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 25 PID 2256 wrote to memory of 2828 2256 d129e79afa5288fa3a38a3eb91d66ade.exe 25 PID 2828 wrote to memory of 2604 2828 cmd.exe 23 PID 2828 wrote to memory of 2604 2828 cmd.exe 23 PID 2828 wrote to memory of 2604 2828 cmd.exe 23 PID 2828 wrote to memory of 2604 2828 cmd.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exeC:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe" /TN QxutJGth3fd4 /F2⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\PORE9xd.xml2⤵
- Suspicious use of WriteProcessMemory
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe"C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3012
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d1d454c0bf0122bc87e428568c57bde6
SHA1bb18b53502fdeabd8874b0e180404f318fd83f99
SHA25670cc6cb5a557020261d3705115b5bcfa86af0662ebe8b6be1c32880c025879dd
SHA512837048cb630c6709cd56813b7495201b8bf907f77499dd3611c457ac47ed30831a32d5f82eba6815c07b0b63a629125839593b83a7d23a2594797dccbb9bb886
-
Filesize
164KB
MD5e0706f4a1f2967e724aad33395ea6a26
SHA1bcb22c2d055fbcdcfe81efee95dd6c73dacd4ecf
SHA256ef1a012fd8503b5bec22739c24518ec94a4e7bae902eafa1bd37b2ab7ec67804
SHA512d4e53e49ef48689f86a7284c97dad9e72fde77b2118d2b04b8ae169a3f8639e0cdb8751054a59cd4ac331b7aa4fe54035491dffb72823f74899f6d40bdb1b06f
-
Filesize
114KB
MD5e3748d2258bbc2508e9b01adcfb141c8
SHA164803a58daa4dd09769eb237e61654ebe126dc41
SHA256246b60ac74351b02cd08d96a840898e35c53a1efc1b3f686c7746dc0e52caca5
SHA512acc23e76136bf9168203461ce995a899ccf09c2886bc4b294c86cc5c9ec62fd66cb8e833f51a5b6315d566720291fa34efa0c264cd61390a477fc2514d7f6614