Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:32
Behavioral task
behavioral1
Sample
f264fde0a75e4c5be4d744721aab0bae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f264fde0a75e4c5be4d744721aab0bae.exe
Resource
win10v2004-20231215-en
General
-
Target
f264fde0a75e4c5be4d744721aab0bae.exe
-
Size
3.9MB
-
MD5
f264fde0a75e4c5be4d744721aab0bae
-
SHA1
582bcb356dce310b577166f82bf4f001a451516e
-
SHA256
ab20ab68ab67761d605ae3f8740d762cdb9e7232bd619b2dbb4849015f7c8ac1
-
SHA512
76448630359b93fbbe57ddc7cb71440787fa7a2e6cb10c4715916b96516419c3f7cdd0f2d431f91d50f76c2c2e1d253ecf1f63e13590a5661869acaefce2b56a
-
SSDEEP
98304:UEgr0WsNA9zyULG+AsMoxvYNZeuA9zyULG+Awgsb4OkQA9zyULG+AsMoxvYNZeuQ:fggczLqe90IzLqWg5VdzLqe90IzLq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 f264fde0a75e4c5be4d744721aab0bae.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 f264fde0a75e4c5be4d744721aab0bae.exe -
Loads dropped DLL 1 IoCs
pid Process 1852 f264fde0a75e4c5be4d744721aab0bae.exe -
resource yara_rule behavioral1/memory/1852-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b0000000126e7-15.dat upx behavioral1/memory/2960-17-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b0000000126e7-13.dat upx behavioral1/files/0x000b0000000126e7-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2900 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 f264fde0a75e4c5be4d744721aab0bae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 f264fde0a75e4c5be4d744721aab0bae.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 f264fde0a75e4c5be4d744721aab0bae.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 f264fde0a75e4c5be4d744721aab0bae.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1852 f264fde0a75e4c5be4d744721aab0bae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1852 f264fde0a75e4c5be4d744721aab0bae.exe 2960 f264fde0a75e4c5be4d744721aab0bae.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2960 1852 f264fde0a75e4c5be4d744721aab0bae.exe 31 PID 1852 wrote to memory of 2960 1852 f264fde0a75e4c5be4d744721aab0bae.exe 31 PID 1852 wrote to memory of 2960 1852 f264fde0a75e4c5be4d744721aab0bae.exe 31 PID 1852 wrote to memory of 2960 1852 f264fde0a75e4c5be4d744721aab0bae.exe 31 PID 2960 wrote to memory of 2900 2960 f264fde0a75e4c5be4d744721aab0bae.exe 30 PID 2960 wrote to memory of 2900 2960 f264fde0a75e4c5be4d744721aab0bae.exe 30 PID 2960 wrote to memory of 2900 2960 f264fde0a75e4c5be4d744721aab0bae.exe 30 PID 2960 wrote to memory of 2900 2960 f264fde0a75e4c5be4d744721aab0bae.exe 30 PID 2960 wrote to memory of 2672 2960 f264fde0a75e4c5be4d744721aab0bae.exe 34 PID 2960 wrote to memory of 2672 2960 f264fde0a75e4c5be4d744721aab0bae.exe 34 PID 2960 wrote to memory of 2672 2960 f264fde0a75e4c5be4d744721aab0bae.exe 34 PID 2960 wrote to memory of 2672 2960 f264fde0a75e4c5be4d744721aab0bae.exe 34 PID 2672 wrote to memory of 2088 2672 cmd.exe 32 PID 2672 wrote to memory of 2088 2672 cmd.exe 32 PID 2672 wrote to memory of 2088 2672 cmd.exe 32 PID 2672 wrote to memory of 2088 2672 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe"C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exeC:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\PxQcA.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2672
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe" /TN U5Z8sQiHf24d /F1⤵
- Creates scheduled task(s)
PID:2900
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN U5Z8sQiHf24d1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD519ffd48378340e34c10a34c36700abcd
SHA14ac5b59283aa9b2bd818f93bb8d748f2ddfaf5ac
SHA256e1ce1d8616887971f05bb316aaee3a728533509fd851b19a80853d9fe7924622
SHA5121e0a0a7c487d765f3ba9f837cd65930c64d56a856e0b7108154ab8fa94def72664441180986875cc315dc44ed66af5fc7bd3b9f84126dbc733a4c5feb4a96616
-
Filesize
54KB
MD594f1f5753e3bed9195436e50a4ae9087
SHA1365dc9a3f7bc5d66f654150e82d727ac77879f3f
SHA25600ec5ee4ababb597f0dcce8009d7825b5ccd0c21a6582803d536dabf1a07d715
SHA512d72657f4b8da80420d2583245e7268148720c1431fb967846d03491dabd5143eb4f9394a0a61facdd5cacab11abdda7aa0a8f52d45a664d05def4351b450e572
-
Filesize
98KB
MD540b3958deb3ad19a77522519aba77091
SHA12ff6ed16adcc3906176eaa01254c98b991754e55
SHA2560a68610afc29b491189ca9fe6bf135b195eb3e4db5a2feda1f5ea9bc3111046f
SHA51208b917fec76c5baebfa6fcf1b3a66cce148cc0661f2a41a64afb5156d802a94fc146001a94628ca364078d1415ae3e76622b064fa94fa408b0e1bac4811ee3bd
-
Filesize
722KB
MD5928d75795eebee9cc8609a84fcee9b90
SHA1b7f47f857fbfe58e35c9e49844744731e37f61c0
SHA256ef5893a27f5b938cca22de667422253b327d6126054f803e731c2c029f8a02af
SHA5128dcc87b60dfac938423c678b3693f62ac0c589e86728f64256e862de067a70dada1a021498240f86e83aa440dc0f01adbd69df9095a4921e5a3e9f9f2cf3f92b