Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 15:58
Behavioral task
behavioral1
Sample
e3aa3521b67dba2baf5f83c118c3a218.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e3aa3521b67dba2baf5f83c118c3a218.exe
Resource
win10v2004-20231215-en
General
-
Target
e3aa3521b67dba2baf5f83c118c3a218.exe
-
Size
1.5MB
-
MD5
e3aa3521b67dba2baf5f83c118c3a218
-
SHA1
a7bfcd82fb626bcd26c8f1399018cc69ebdea9aa
-
SHA256
023a9696279b3e257f30853097352649aa2b1dfed0ef6481129b8920114e4dd4
-
SHA512
6df733d1815c7e9d7cb85f6bae49eeb90f2ca97f1ef15ec6965aa0155db53900cb1a81e24ac76dee0203655d35dfdf789cdd8af3b560c03347948e3885a40d52
-
SSDEEP
24576:2UpEwdgwYh1ToqhpIcjukL2GsknNfijtXJYviCgMi6pcjukL2Y:/pEwdgwYh1To+IcakLJBij/Y3gMiccaM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 e3aa3521b67dba2baf5f83c118c3a218.exe -
Executes dropped EXE 1 IoCs
pid Process 2852 e3aa3521b67dba2baf5f83c118c3a218.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 e3aa3521b67dba2baf5f83c118c3a218.exe -
resource yara_rule behavioral1/memory/2368-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000015df1-17.dat upx behavioral1/files/0x0009000000015df1-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2152 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e3aa3521b67dba2baf5f83c118c3a218.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 e3aa3521b67dba2baf5f83c118c3a218.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 e3aa3521b67dba2baf5f83c118c3a218.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 e3aa3521b67dba2baf5f83c118c3a218.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2368 e3aa3521b67dba2baf5f83c118c3a218.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2368 e3aa3521b67dba2baf5f83c118c3a218.exe 2852 e3aa3521b67dba2baf5f83c118c3a218.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2852 2368 e3aa3521b67dba2baf5f83c118c3a218.exe 23 PID 2368 wrote to memory of 2852 2368 e3aa3521b67dba2baf5f83c118c3a218.exe 23 PID 2368 wrote to memory of 2852 2368 e3aa3521b67dba2baf5f83c118c3a218.exe 23 PID 2368 wrote to memory of 2852 2368 e3aa3521b67dba2baf5f83c118c3a218.exe 23 PID 2852 wrote to memory of 2152 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 19 PID 2852 wrote to memory of 2152 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 19 PID 2852 wrote to memory of 2152 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 19 PID 2852 wrote to memory of 2152 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 19 PID 2852 wrote to memory of 3012 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 20 PID 2852 wrote to memory of 3012 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 20 PID 2852 wrote to memory of 3012 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 20 PID 2852 wrote to memory of 3012 2852 e3aa3521b67dba2baf5f83c118c3a218.exe 20 PID 3012 wrote to memory of 2584 3012 cmd.exe 21 PID 3012 wrote to memory of 2584 3012 cmd.exe 21 PID 3012 wrote to memory of 2584 3012 cmd.exe 21 PID 3012 wrote to memory of 2584 3012 cmd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3aa3521b67dba2baf5f83c118c3a218.exe"C:\Users\Admin\AppData\Local\Temp\e3aa3521b67dba2baf5f83c118c3a218.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\e3aa3521b67dba2baf5f83c118c3a218.exeC:\Users\Admin\AppData\Local\Temp\e3aa3521b67dba2baf5f83c118c3a218.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e3aa3521b67dba2baf5f83c118c3a218.exe" /TN 6ek6uOO9da42 /F1⤵
- Creates scheduled task(s)
PID:2152
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\wW4Qm.xml1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da422⤵PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD5a680a7a04801128361c2636b5ee7f12a
SHA1c5b513a20a2ea342dd107bf7dc32ee4925091055
SHA2564e4e351d0f9a3fbbd65ea3ef4e50d27628b90ea5b72fbee04e79aea8affe1f83
SHA512da840efe87757dd0fb69292d21c20086aa4dfff4d1d01f26514e7359b8c22a2281a474e8d5da19433eb343b62c0249917eb581f10e162771d94ce651db27e73d
-
Filesize
1KB
MD54dbfe51c2975157b94abc0d498c3f303
SHA15da48da007858712061d552d6d1c7013a8d14441
SHA256e70c9e26ad89417a630e4f853be24b93cc156272f3f938ab86d7ae5f5c87676d
SHA512da91ecd210fdd6dc358830886c63bd69d84b5b1c87691d602101829e4327b9597aa16e84dfa331d86bc0041f2496651632524513bc813b0a5bac3c7ac5711936
-
Filesize
89KB
MD522bf99620bca57c370c49b2b25ef177a
SHA12867dd962e3cf82d42160749ef49dded529e9061
SHA256e6dc46518ce097cc6bacf26148c9c3524aa2570e9ba92230ea8e01a406a17bdb
SHA512dbb067190620d4d4b685c4c7de5f0de0b727f67d1676be1c3455403dd180cacaf43e74661d22552a36e71d90be5c7daaddbd943f36e2707180373a637e2640a0