Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:07
Static task
static1
Behavioral task
behavioral1
Sample
1829db9dd223bd0390cfc507bead31b0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1829db9dd223bd0390cfc507bead31b0.exe
Resource
win10v2004-20231215-en
General
-
Target
1829db9dd223bd0390cfc507bead31b0.exe
-
Size
385KB
-
MD5
1829db9dd223bd0390cfc507bead31b0
-
SHA1
39ddeed90db08111c27eaf65486c07412f1e820b
-
SHA256
d3f1cdfe04d3606bde308f8d53dc57370a0ff1ac15bdbeea44b402a159f62fad
-
SHA512
ba73b98477777fcc2c36d5928344eac57ff084795d69b779b2445e9e4012e3adc608b3138d406e95cba00e7de948d29b978e68c284aca1dc320f55a470332d36
-
SSDEEP
6144:vgRtBh91WZln6WTG0YLfNnEKiLrTGyd2r6Ye/eKgxblxTCHtM3XtUb1B:vGtPTYULfNE/T5F2xblxei9Ub1B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 1829db9dd223bd0390cfc507bead31b0.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 1829db9dd223bd0390cfc507bead31b0.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 1829db9dd223bd0390cfc507bead31b0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 1829db9dd223bd0390cfc507bead31b0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 1829db9dd223bd0390cfc507bead31b0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 1829db9dd223bd0390cfc507bead31b0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 1829db9dd223bd0390cfc507bead31b0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2924 1829db9dd223bd0390cfc507bead31b0.exe 3004 1829db9dd223bd0390cfc507bead31b0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3004 2924 1829db9dd223bd0390cfc507bead31b0.exe 16 PID 2924 wrote to memory of 3004 2924 1829db9dd223bd0390cfc507bead31b0.exe 16 PID 2924 wrote to memory of 3004 2924 1829db9dd223bd0390cfc507bead31b0.exe 16 PID 2924 wrote to memory of 3004 2924 1829db9dd223bd0390cfc507bead31b0.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exeC:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe1⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:3004
-
C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe"C:\Users\Admin\AppData\Local\Temp\1829db9dd223bd0390cfc507bead31b0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
385KB
MD5a70286296d227d4474dcd453c7edf357
SHA12bd1c26530d8f6827390eac7ecaf4d1e486f36b7
SHA256c4772aebbfaa9d41e060f9c313566610aabc7a5392cbbcccf81a67cd12fb2710
SHA51212429fa4606e12a97a7671e0d07d130c63b3644568facecff5753c0d7641e26e1fe95722c5cc785ac214cc6f6ee276bdba40001be65f20752810d5aaad69cb5a
-
Filesize
93KB
MD5489fdffd76c9f4819702b5a66114eb90
SHA1136eff82d197cd5e2df24659fd2c75dafafc4daa
SHA256bddddc592cc699ba2113d1eb900dfb67d6a8a6cb21c839569709d067f5a6e8b6
SHA512170c2bf5994da7647b5d9b2f127ae7c0306c4870ae1e98f6d10673c8f48486658b8edf49d4c538789414c8ceea6434cdb1470474ad1bbbc5835ebd9783897c16
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
98KB
MD592c314e573df86b70c9baa7a9425d14b
SHA1712a3dd653b6892b1e9d0de7d9f7afebcfb8c45b
SHA2565564e2ede0bfc7bd893c0a6f23f3bcd315da65c72e3707cb775a2d94972f4fc6
SHA512c753379698e7093bbbfce78f5c536890c0c783dfbc9e065614bf1db56560c4d92cde3af7380fb84a5429ab00c1353f990f99dc6d2d7fa08a3a6e3d9473cfc645