Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:15
Behavioral task
behavioral1
Sample
d595e0c5c59a78d222374a26926065fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d595e0c5c59a78d222374a26926065fc.exe
Resource
win10v2004-20231215-en
General
-
Target
d595e0c5c59a78d222374a26926065fc.exe
-
Size
1.5MB
-
MD5
d595e0c5c59a78d222374a26926065fc
-
SHA1
a9947a4926bfc741d4de8a01b4400d224fbc1e1d
-
SHA256
b3588fe65c00eea5a4a132e9b1c5db364070a32d3e4be4848f7b9f234d545ee8
-
SHA512
97700a870f4045497062d2fe482a585f6bd2f6a2130a9cebfb60314b7c1b3e13f8ae5fd8b851c812e17f2317d4515343c8b44585d0d0646cc3a5d50ae8e0a300
-
SSDEEP
24576:M7n6CsuaT/IVZP5a1oJkDpjucjukL20QKzd0ZEUZ06X7BLcjukL2Y:MmCsuGIVZP5a1oJkDpjucakLHQK50ZEf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 d595e0c5c59a78d222374a26926065fc.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 d595e0c5c59a78d222374a26926065fc.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 d595e0c5c59a78d222374a26926065fc.exe -
resource yara_rule behavioral1/memory/2668-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001223f-11.dat upx behavioral1/files/0x000b00000001223f-17.dat upx behavioral1/memory/2696-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 d595e0c5c59a78d222374a26926065fc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 d595e0c5c59a78d222374a26926065fc.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 d595e0c5c59a78d222374a26926065fc.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 d595e0c5c59a78d222374a26926065fc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2668 d595e0c5c59a78d222374a26926065fc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2668 d595e0c5c59a78d222374a26926065fc.exe 2696 d595e0c5c59a78d222374a26926065fc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2696 2668 d595e0c5c59a78d222374a26926065fc.exe 29 PID 2668 wrote to memory of 2696 2668 d595e0c5c59a78d222374a26926065fc.exe 29 PID 2668 wrote to memory of 2696 2668 d595e0c5c59a78d222374a26926065fc.exe 29 PID 2668 wrote to memory of 2696 2668 d595e0c5c59a78d222374a26926065fc.exe 29 PID 2696 wrote to memory of 2596 2696 d595e0c5c59a78d222374a26926065fc.exe 30 PID 2696 wrote to memory of 2596 2696 d595e0c5c59a78d222374a26926065fc.exe 30 PID 2696 wrote to memory of 2596 2696 d595e0c5c59a78d222374a26926065fc.exe 30 PID 2696 wrote to memory of 2596 2696 d595e0c5c59a78d222374a26926065fc.exe 30 PID 2696 wrote to memory of 1680 2696 d595e0c5c59a78d222374a26926065fc.exe 32 PID 2696 wrote to memory of 1680 2696 d595e0c5c59a78d222374a26926065fc.exe 32 PID 2696 wrote to memory of 1680 2696 d595e0c5c59a78d222374a26926065fc.exe 32 PID 2696 wrote to memory of 1680 2696 d595e0c5c59a78d222374a26926065fc.exe 32 PID 1680 wrote to memory of 2904 1680 cmd.exe 34 PID 1680 wrote to memory of 2904 1680 cmd.exe 34 PID 1680 wrote to memory of 2904 1680 cmd.exe 34 PID 1680 wrote to memory of 2904 1680 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d595e0c5c59a78d222374a26926065fc.exe"C:\Users\Admin\AppData\Local\Temp\d595e0c5c59a78d222374a26926065fc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\d595e0c5c59a78d222374a26926065fc.exeC:\Users\Admin\AppData\Local\Temp\d595e0c5c59a78d222374a26926065fc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d595e0c5c59a78d222374a26926065fc.exe" /TN uhTCmbCqd877 /F3⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\Yb55W.xml3⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uhTCmbCqd8774⤵PID:2904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD582eccd20368cbfbad176b5da7ffe5db3
SHA18aa3d459ea75118fff8c1068486b1ffd857e1916
SHA256f315201ba27b782b001bee26c29eb15211a92cace756e304c3cadf5ddf8c92d9
SHA51296ca5619f6459e546e0093a8f106d71fe499b862d4d6fb9172bf3a7dcdb900e0dcac6b01d85245d44a50d4c8f2b6536b24a42415feaaa6bbce0a659291f8ae55
-
Filesize
146KB
MD593feb280271dd91ea936bf16ca4ba67f
SHA1df77f8ed09d052433698c850a73b7a20307a8282
SHA2565fb940e9298e901aec2ad8c3a4a0cb61c282ebe07562a2e5056394fb9547f2ab
SHA51250c7fd3f2122ef4f7a2484ccc3ce7807223a7478afc7f01e2723026fe099272824e81d21b4e631590e06f0a380abde3922998e9bfe4b6f638591c4458883c9c5