Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:38
Behavioral task
behavioral1
Sample
05d6d24c4d8cb94b46e872777e1234d2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05d6d24c4d8cb94b46e872777e1234d2.exe
Resource
win10v2004-20231222-en
General
-
Target
05d6d24c4d8cb94b46e872777e1234d2.exe
-
Size
821KB
-
MD5
05d6d24c4d8cb94b46e872777e1234d2
-
SHA1
3549cbfdc2762624a91388b43ddf7955744de774
-
SHA256
a339d8b32f5ad16cffc15277c9db7e582febfd126be4766ef4138bc9b4ca7746
-
SHA512
08072f214e702cf2172580aa384d3bf4d9d39b3a97843f895537ad5ba7211bb398ac59d62f0aede8c1b0846c55a5a7f87ff123b6cd7f4003e4173eb8e699060b
-
SSDEEP
24576:QVE3KvgttOULSFrSrFiT5M2acjukL2CDYO:YE3KvAYuSFr8FiTa2acakLz0O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 05d6d24c4d8cb94b46e872777e1234d2.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 05d6d24c4d8cb94b46e872777e1234d2.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 05d6d24c4d8cb94b46e872777e1234d2.exe -
resource yara_rule behavioral1/files/0x000c00000001224c-11.dat upx behavioral1/memory/2088-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2432-17-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 05d6d24c4d8cb94b46e872777e1234d2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 05d6d24c4d8cb94b46e872777e1234d2.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 05d6d24c4d8cb94b46e872777e1234d2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 05d6d24c4d8cb94b46e872777e1234d2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 05d6d24c4d8cb94b46e872777e1234d2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2088 05d6d24c4d8cb94b46e872777e1234d2.exe 2432 05d6d24c4d8cb94b46e872777e1234d2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2432 2088 05d6d24c4d8cb94b46e872777e1234d2.exe 16 PID 2088 wrote to memory of 2432 2088 05d6d24c4d8cb94b46e872777e1234d2.exe 16 PID 2088 wrote to memory of 2432 2088 05d6d24c4d8cb94b46e872777e1234d2.exe 16 PID 2088 wrote to memory of 2432 2088 05d6d24c4d8cb94b46e872777e1234d2.exe 16 PID 2432 wrote to memory of 2828 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 18 PID 2432 wrote to memory of 2828 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 18 PID 2432 wrote to memory of 2828 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 18 PID 2432 wrote to memory of 2828 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 18 PID 2432 wrote to memory of 2712 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 23 PID 2432 wrote to memory of 2712 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 23 PID 2432 wrote to memory of 2712 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 23 PID 2432 wrote to memory of 2712 2432 05d6d24c4d8cb94b46e872777e1234d2.exe 23 PID 2712 wrote to memory of 2944 2712 cmd.exe 21 PID 2712 wrote to memory of 2944 2712 cmd.exe 21 PID 2712 wrote to memory of 2944 2712 cmd.exe 21 PID 2712 wrote to memory of 2944 2712 cmd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d6d24c4d8cb94b46e872777e1234d2.exe"C:\Users\Admin\AppData\Local\Temp\05d6d24c4d8cb94b46e872777e1234d2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\05d6d24c4d8cb94b46e872777e1234d2.exeC:\Users\Admin\AppData\Local\Temp\05d6d24c4d8cb94b46e872777e1234d2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\05d6d24c4d8cb94b46e872777e1234d2.exe" /TN QxutJGth3fd4 /F3⤵
- Creates scheduled task(s)
PID:2828
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\7EcxgVFaX.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2712
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD59d1a8a7431535e67561272cec940daef
SHA19586ec663db98738726274992800b4501a47f3d9
SHA2563540074d9786bdfef968629fef636c4d51297f2097c88adf12dcede8b8397e48
SHA512fbb6c6b462e2dfef5d7f0567c6edcc3afad0b76a62f03025b9fe704c6a5a86403aa2ec774a2864ababe1ccd0c20cde0c7f7da408a273eb74e00690fe127e7383