Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 17:34
Static task
static1
Behavioral task
behavioral1
Sample
3137efb151b9be7076a03365e92b5b18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3137efb151b9be7076a03365e92b5b18.exe
Resource
win10v2004-20231222-en
General
-
Target
3137efb151b9be7076a03365e92b5b18.exe
-
Size
907KB
-
MD5
3137efb151b9be7076a03365e92b5b18
-
SHA1
d179f03798fb0a3aeca5610c829783c060243a96
-
SHA256
c22b57eacc4dffd580f921f3a8b2c74d2466add8e84ed8c96b90ac171a04e2c6
-
SHA512
31b9469f865d348e93094d707a0234b5fe338c679688f1ebf2cc937fbd8dc850e9b65cf9a4e98aebd63d90750e55134aef05fb3f853af7b5718d1e152f8bc937
-
SSDEEP
24576:VrsVIPcrbhRlSZf8r/caDyJzxejpra/ZS1:oOcrdRlSZf8r/PyJzy9gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2776 3137efb151b9be7076a03365e92b5b18.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 3137efb151b9be7076a03365e92b5b18.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 3137efb151b9be7076a03365e92b5b18.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 3137efb151b9be7076a03365e92b5b18.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 3137efb151b9be7076a03365e92b5b18.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 3137efb151b9be7076a03365e92b5b18.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 3137efb151b9be7076a03365e92b5b18.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1704 3137efb151b9be7076a03365e92b5b18.exe 2776 3137efb151b9be7076a03365e92b5b18.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2776 1704 3137efb151b9be7076a03365e92b5b18.exe 23 PID 1704 wrote to memory of 2776 1704 3137efb151b9be7076a03365e92b5b18.exe 23 PID 1704 wrote to memory of 2776 1704 3137efb151b9be7076a03365e92b5b18.exe 23 PID 1704 wrote to memory of 2776 1704 3137efb151b9be7076a03365e92b5b18.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\3137efb151b9be7076a03365e92b5b18.exe"C:\Users\Admin\AppData\Local\Temp\3137efb151b9be7076a03365e92b5b18.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3137efb151b9be7076a03365e92b5b18.exeC:\Users\Admin\AppData\Local\Temp\3137efb151b9be7076a03365e92b5b18.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD53f356ad3553721a1584bc881275bf20c
SHA1b0c7e6ef880d2577f4dbeff1369ae368e4d33d3a
SHA2561f84dea8f5bbd22cbd5050b16eb55ee0bc90caf39afa3f0c4860231ea37f938a
SHA512c00ae44a596b98d703d6dee13b2f5c966c7097642a79bc58f1e35719d7f55607b6f8d54a66ad64bb3d7169815d4b126db346a0fe80bff1cd035f3f5b2f7aca64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
69KB
MD575d3875b21ccb09f59845dace2d03d09
SHA14813a9421ac51839497851a6cedf9a5301d8e551
SHA2564c571369892287a189a2701c3d1b2ed3691cbd2a59f6b542bc61001d78641251
SHA512eafabac5f325f7acf0c257e1bd858fbaaf472f27665fd76b5a70bd64d7a58e7dabd8d5bd1e70f85d5549396e6232617fedb82ac8889dee6fe89e24509354d5da
-
Filesize
53KB
MD5f820aa37bf95fe6eda4527016c9d118d
SHA1e78465af3bcc8579e9cdaf2c898db0dd78b91b3a
SHA25616385ede99f43066cc57be7e033291cdde831d4ee29b34bed699e29e8f4f1c00
SHA51255377e547557b241445d41487c58a3ab9601e64b5bda60786851a06fe2424f52021ae52c458561774f9189c6980517c8bdfc692d6b32d4115bff5360b52144d5