Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:58
Behavioral task
behavioral1
Sample
e3b32531ff26ddb49cef955e565fef4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e3b32531ff26ddb49cef955e565fef4a.exe
Resource
win10v2004-20231215-en
General
-
Target
e3b32531ff26ddb49cef955e565fef4a.exe
-
Size
1.5MB
-
MD5
e3b32531ff26ddb49cef955e565fef4a
-
SHA1
6b1816e6ba00871b2ac0fc98b76654b7d4f63ed7
-
SHA256
6a1b2eac3e4746f7635abfe12d19f237dfefedbe82b0b79c806a6e508d40bd22
-
SHA512
6eb2af953831f3c1d810464e84ab902468380e6eefc42ff705a9ddc549c078a7ef3110343574ece5ba064fde9c693c7843de98802a2173454b0286dd2b2ee30b
-
SSDEEP
24576:c+ejQ7fJt2BSfuTwQLyhWveB+4goGQoadai7D3uITjIFOxo53ApIj:c+ejQ7fJt2ByuTwQLyhWveB+4goGQ7aX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 e3b32531ff26ddb49cef955e565fef4a.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 e3b32531ff26ddb49cef955e565fef4a.exe -
Loads dropped DLL 1 IoCs
pid Process 1760 e3b32531ff26ddb49cef955e565fef4a.exe -
resource yara_rule behavioral1/memory/1760-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c000000012252-11.dat upx behavioral1/memory/1760-16-0x0000000022FD0000-0x000000002322C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2680 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 e3b32531ff26ddb49cef955e565fef4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e3b32531ff26ddb49cef955e565fef4a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 e3b32531ff26ddb49cef955e565fef4a.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 e3b32531ff26ddb49cef955e565fef4a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1760 e3b32531ff26ddb49cef955e565fef4a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1760 e3b32531ff26ddb49cef955e565fef4a.exe 2316 e3b32531ff26ddb49cef955e565fef4a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2316 1760 e3b32531ff26ddb49cef955e565fef4a.exe 29 PID 1760 wrote to memory of 2316 1760 e3b32531ff26ddb49cef955e565fef4a.exe 29 PID 1760 wrote to memory of 2316 1760 e3b32531ff26ddb49cef955e565fef4a.exe 29 PID 1760 wrote to memory of 2316 1760 e3b32531ff26ddb49cef955e565fef4a.exe 29 PID 2316 wrote to memory of 2680 2316 e3b32531ff26ddb49cef955e565fef4a.exe 30 PID 2316 wrote to memory of 2680 2316 e3b32531ff26ddb49cef955e565fef4a.exe 30 PID 2316 wrote to memory of 2680 2316 e3b32531ff26ddb49cef955e565fef4a.exe 30 PID 2316 wrote to memory of 2680 2316 e3b32531ff26ddb49cef955e565fef4a.exe 30 PID 2316 wrote to memory of 2896 2316 e3b32531ff26ddb49cef955e565fef4a.exe 32 PID 2316 wrote to memory of 2896 2316 e3b32531ff26ddb49cef955e565fef4a.exe 32 PID 2316 wrote to memory of 2896 2316 e3b32531ff26ddb49cef955e565fef4a.exe 32 PID 2316 wrote to memory of 2896 2316 e3b32531ff26ddb49cef955e565fef4a.exe 32 PID 2896 wrote to memory of 2584 2896 cmd.exe 34 PID 2896 wrote to memory of 2584 2896 cmd.exe 34 PID 2896 wrote to memory of 2584 2896 cmd.exe 34 PID 2896 wrote to memory of 2584 2896 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe"C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exeC:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe" /TN Nnb8kaFf43a4 /F3⤵
- Creates scheduled task(s)
PID:2680
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN Nnb8kaFf43a4 > C:\Users\Admin\AppData\Local\Temp\D9eQZu.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN Nnb8kaFf43a44⤵PID:2584
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555e857bec315d378da564a3b98775368
SHA1e581ace1c4fdbfdcf139af96f1551970afeeca44
SHA2562637d2c7cf954bfcc8b4dec8a7f7d182d2fcdd8aafa3a84c8fbb871c6919048f
SHA512eeb96c70e4630efae111e306c62a3c56f1e104df0a74db3b987d67a8d443b94e3ddbdf8d654dc790a2e61f4dd65349b0cd4a2b0a85655667e94e4cbbded77b4c
-
Filesize
1.5MB
MD5ec2c2af382f06a7c35e048ab3fb7f690
SHA14a59dd777338d27ebace75599a83134895b57f2f
SHA256a94b3390ef3b085c7366cd69ececbbb3f90d74a26e538295c2c0ded867fff54e
SHA51229103dce4c6e02aaf00c4a4ab4663219644f8a889e4c9543e563a6401c4c1e1d5bcade04b03b13a10a5471248893347a9bbd8a7ef96142475b9b46812d54887b