Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:17
Behavioral task
behavioral1
Sample
07f56f3786b1ade31eabcfbd63e6c516.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07f56f3786b1ade31eabcfbd63e6c516.exe
Resource
win10v2004-20231222-en
General
-
Target
07f56f3786b1ade31eabcfbd63e6c516.exe
-
Size
501KB
-
MD5
07f56f3786b1ade31eabcfbd63e6c516
-
SHA1
38498da8934e6fa4d33fb6069aff0191859e161a
-
SHA256
9fdf499501d7fa089e0b74e5571aabb9c1967746b47d1c77b7b004bbe9effe91
-
SHA512
87359052df8f1ef8f2d717a20299ecd82d4eace41e0d78aa1f70c74ab958780b03582ae3284d5dd55f399f3e39cb213d512b8123608abe1cc8126a917a715eb7
-
SSDEEP
12288:CmM26keYrNbL4c+3CAoY9xrMxwq1KYioUVbRskTmvme:CdvYrNbLRdY/Cw8KYioUtTA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 07f56f3786b1ade31eabcfbd63e6c516.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 07f56f3786b1ade31eabcfbd63e6c516.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 07f56f3786b1ade31eabcfbd63e6c516.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c000000012261-11.dat upx behavioral1/memory/2172-16-0x0000000022FF0000-0x000000002324C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 07f56f3786b1ade31eabcfbd63e6c516.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 07f56f3786b1ade31eabcfbd63e6c516.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 07f56f3786b1ade31eabcfbd63e6c516.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 07f56f3786b1ade31eabcfbd63e6c516.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2172 07f56f3786b1ade31eabcfbd63e6c516.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2172 07f56f3786b1ade31eabcfbd63e6c516.exe 2676 07f56f3786b1ade31eabcfbd63e6c516.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2676 2172 07f56f3786b1ade31eabcfbd63e6c516.exe 29 PID 2172 wrote to memory of 2676 2172 07f56f3786b1ade31eabcfbd63e6c516.exe 29 PID 2172 wrote to memory of 2676 2172 07f56f3786b1ade31eabcfbd63e6c516.exe 29 PID 2172 wrote to memory of 2676 2172 07f56f3786b1ade31eabcfbd63e6c516.exe 29 PID 2676 wrote to memory of 2644 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 30 PID 2676 wrote to memory of 2644 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 30 PID 2676 wrote to memory of 2644 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 30 PID 2676 wrote to memory of 2644 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 30 PID 2676 wrote to memory of 2700 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 33 PID 2676 wrote to memory of 2700 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 33 PID 2676 wrote to memory of 2700 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 33 PID 2676 wrote to memory of 2700 2676 07f56f3786b1ade31eabcfbd63e6c516.exe 33 PID 2700 wrote to memory of 1668 2700 cmd.exe 35 PID 2700 wrote to memory of 1668 2700 cmd.exe 35 PID 2700 wrote to memory of 1668 2700 cmd.exe 35 PID 2700 wrote to memory of 1668 2700 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe"C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exeC:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe" /TN WAgLRKqP8c0d /F3⤵
- Creates scheduled task(s)
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN WAgLRKqP8c0d > C:\Users\Admin\AppData\Local\Temp\wlLteiUm.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN WAgLRKqP8c0d4⤵PID:1668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9e68eb3b3ae983000d31b37dac59a0e
SHA1818b1e0c1837ddaad6dbc388fd671442a3a732a4
SHA256c5ed0087e1301f5f0c6f4eebb0dc6b3d252bee4d9b6f5b517740f685180fc5c2
SHA51264cd2e026a3cdfc6b14803ebaa69403465afb8eaa58decafa4d1ba5d2435de854c4ac945f6c573c5b5d3e96a08115c6c6b4226af621c24a7ebbc30bd3b329fc1
-
Filesize
501KB
MD51ba4fd7bede3ef098f6ce7e8a3344bbb
SHA1af60a04f178bbabea65c5f02ef1ac6f0e347b26a
SHA256e35fa90e4eb2fef697d5372b78d6e9477f451412d98c44d23803abd6ddc0863f
SHA512c404a2d8061dd209a6c2fac337f949b71559429e05a3a58ea9c3bc64d10b2897ce562b1629a5052c7a4def54b731f4be1f142b24f3e0766043af16e89956db45