Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:45
Behavioral task
behavioral1
Sample
f791c1a7110aee7574026888645c783f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f791c1a7110aee7574026888645c783f.exe
Resource
win10v2004-20231215-en
General
-
Target
f791c1a7110aee7574026888645c783f.exe
-
Size
2.0MB
-
MD5
f791c1a7110aee7574026888645c783f
-
SHA1
464ee53e7988c0ea5bd9dc2c29a172c5690a864a
-
SHA256
b12a15670fa6772cec7412024a20e083dcef7e1f03e65ea07dca73408432ef31
-
SHA512
fed5dd8f55f8c1b02460d3708fa666831463ab02ee163ff173f85a97e4a22ab44bda42259e426004de704cde5cf8c09bb93c941ee630bb256ce1c8ad3c89daf7
-
SSDEEP
49152:N3fkjTtIJb4NGQk4QnoucN+9zWFULG+m7YnNkJ10LAdbjLcN+9zWFULG+:N3sjTtdk44o3A9zyULG+m7SkJ100dbjP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 f791c1a7110aee7574026888645c783f.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 f791c1a7110aee7574026888645c783f.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 f791c1a7110aee7574026888645c783f.exe -
resource yara_rule behavioral1/memory/2340-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012252-17.dat upx behavioral1/files/0x000b000000012252-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2872 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 f791c1a7110aee7574026888645c783f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 f791c1a7110aee7574026888645c783f.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 f791c1a7110aee7574026888645c783f.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 f791c1a7110aee7574026888645c783f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2340 f791c1a7110aee7574026888645c783f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2340 f791c1a7110aee7574026888645c783f.exe 2308 f791c1a7110aee7574026888645c783f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2308 2340 f791c1a7110aee7574026888645c783f.exe 29 PID 2340 wrote to memory of 2308 2340 f791c1a7110aee7574026888645c783f.exe 29 PID 2340 wrote to memory of 2308 2340 f791c1a7110aee7574026888645c783f.exe 29 PID 2340 wrote to memory of 2308 2340 f791c1a7110aee7574026888645c783f.exe 29 PID 2308 wrote to memory of 2872 2308 f791c1a7110aee7574026888645c783f.exe 30 PID 2308 wrote to memory of 2872 2308 f791c1a7110aee7574026888645c783f.exe 30 PID 2308 wrote to memory of 2872 2308 f791c1a7110aee7574026888645c783f.exe 30 PID 2308 wrote to memory of 2872 2308 f791c1a7110aee7574026888645c783f.exe 30 PID 2308 wrote to memory of 2600 2308 f791c1a7110aee7574026888645c783f.exe 32 PID 2308 wrote to memory of 2600 2308 f791c1a7110aee7574026888645c783f.exe 32 PID 2308 wrote to memory of 2600 2308 f791c1a7110aee7574026888645c783f.exe 32 PID 2308 wrote to memory of 2600 2308 f791c1a7110aee7574026888645c783f.exe 32 PID 2600 wrote to memory of 2592 2600 cmd.exe 34 PID 2600 wrote to memory of 2592 2600 cmd.exe 34 PID 2600 wrote to memory of 2592 2600 cmd.exe 34 PID 2600 wrote to memory of 2592 2600 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f791c1a7110aee7574026888645c783f.exe"C:\Users\Admin\AppData\Local\Temp\f791c1a7110aee7574026888645c783f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\f791c1a7110aee7574026888645c783f.exeC:\Users\Admin\AppData\Local\Temp\f791c1a7110aee7574026888645c783f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f791c1a7110aee7574026888645c783f.exe" /TN WAgLRKqP8c0d /F3⤵
- Creates scheduled task(s)
PID:2872
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN WAgLRKqP8c0d > C:\Users\Admin\AppData\Local\Temp\beQAsC.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN WAgLRKqP8c0d4⤵PID:2592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD597854343642c267300f94a0fc197b745
SHA18897402ca9848b39e46d1191282f0931b9b75466
SHA256671f891731f6ed24a61b87782ecd65b7cb68301a6debae9f97e2d575eebd2877
SHA512a321a42755c65e304934bb1a9076a7ae8372906a4fc308ad0204d2daaf6795ed36de6191b48fb8e2b4d9f0e38e3407cebe23c8d1a918b924e6e087a7bf561b09
-
Filesize
1.5MB
MD5f45cf80f7dbeb4d6ccdd4e6a6a0a7277
SHA1c487c04ba7a1a4e62d1b085f18a8baba67503c2f
SHA2560af8a7d3efe0e3d8c23b912a5eab5e96579247794218fe63b3abf4cc840b18e6
SHA5124767e5272de6d332676d9993da034451dc9c60399c70ded7e69bb6d26e59f3cfb26c64c362ff4da06621b22a7f8be0007f6fb926c70483181f93b4614db4685c
-
Filesize
1.9MB
MD56403717f6df676a2f88319b760a36bff
SHA1e460128e9fa7b2a518dd17831fd7b415b427308a
SHA2569a01b0c0fdb3a70ab2e000ed30e68e4bd9a28419795d7de5fd241a63099ed2cb
SHA512f5621808359f02e8f22fbc5f8536be6bac7fe3fc6da9b4c77cde517fa0fdaae34806949fb81e30050c70bd2e67d03ffc297955bc5f404dd4fe47ea19d4aabe4d