Analysis
-
max time kernel
154s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:33
Behavioral task
behavioral1
Sample
01dc0854aadd66ba452e3ae707d4c704.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01dc0854aadd66ba452e3ae707d4c704.exe
Resource
win10v2004-20231215-en
General
-
Target
01dc0854aadd66ba452e3ae707d4c704.exe
-
Size
1003KB
-
MD5
01dc0854aadd66ba452e3ae707d4c704
-
SHA1
735a32d55a5be1a8b61eecf8c35cf894f117d3a5
-
SHA256
ac7fc99a74f09b50af660939fc52c319c845508e41c88191d849a25e5021f733
-
SHA512
75e8d48076f483bc3eb38082edbd8079fcc55403f990c7bba1018de896cf5ab3238aff2acfb38ad3ed7f75cee926b703567197aa92597a184de73a516fbfcf85
-
SSDEEP
24576:6FJmRySK5JgkL1aOcK+Ila1dLNi84vmMh:UGyf5JDL0OcK+IlYZNi84vm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 01dc0854aadd66ba452e3ae707d4c704.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 01dc0854aadd66ba452e3ae707d4c704.exe -
Loads dropped DLL 1 IoCs
pid Process 2708 01dc0854aadd66ba452e3ae707d4c704.exe -
resource yara_rule behavioral1/memory/2708-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012263-15.dat upx behavioral1/memory/2792-17-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012263-13.dat upx behavioral1/files/0x000b000000012263-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 01dc0854aadd66ba452e3ae707d4c704.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 01dc0854aadd66ba452e3ae707d4c704.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 01dc0854aadd66ba452e3ae707d4c704.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 01dc0854aadd66ba452e3ae707d4c704.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2708 01dc0854aadd66ba452e3ae707d4c704.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2708 01dc0854aadd66ba452e3ae707d4c704.exe 2792 01dc0854aadd66ba452e3ae707d4c704.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2792 2708 01dc0854aadd66ba452e3ae707d4c704.exe 30 PID 2708 wrote to memory of 2792 2708 01dc0854aadd66ba452e3ae707d4c704.exe 30 PID 2708 wrote to memory of 2792 2708 01dc0854aadd66ba452e3ae707d4c704.exe 30 PID 2708 wrote to memory of 2792 2708 01dc0854aadd66ba452e3ae707d4c704.exe 30 PID 2792 wrote to memory of 2584 2792 01dc0854aadd66ba452e3ae707d4c704.exe 31 PID 2792 wrote to memory of 2584 2792 01dc0854aadd66ba452e3ae707d4c704.exe 31 PID 2792 wrote to memory of 2584 2792 01dc0854aadd66ba452e3ae707d4c704.exe 31 PID 2792 wrote to memory of 2584 2792 01dc0854aadd66ba452e3ae707d4c704.exe 31 PID 2792 wrote to memory of 2544 2792 01dc0854aadd66ba452e3ae707d4c704.exe 33 PID 2792 wrote to memory of 2544 2792 01dc0854aadd66ba452e3ae707d4c704.exe 33 PID 2792 wrote to memory of 2544 2792 01dc0854aadd66ba452e3ae707d4c704.exe 33 PID 2792 wrote to memory of 2544 2792 01dc0854aadd66ba452e3ae707d4c704.exe 33 PID 2544 wrote to memory of 2628 2544 cmd.exe 35 PID 2544 wrote to memory of 2628 2544 cmd.exe 35 PID 2544 wrote to memory of 2628 2544 cmd.exe 35 PID 2544 wrote to memory of 2628 2544 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\01dc0854aadd66ba452e3ae707d4c704.exe"C:\Users\Admin\AppData\Local\Temp\01dc0854aadd66ba452e3ae707d4c704.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\01dc0854aadd66ba452e3ae707d4c704.exeC:\Users\Admin\AppData\Local\Temp\01dc0854aadd66ba452e3ae707d4c704.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\01dc0854aadd66ba452e3ae707d4c704.exe" /TN x1iLRz9v069a /F3⤵
- Creates scheduled task(s)
PID:2584
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN x1iLRz9v069a > C:\Users\Admin\AppData\Local\Temp\no52Dak.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN x1iLRz9v069a4⤵PID:2628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD535fa4e5dde50380c1d9cd800cff79f10
SHA1cd609e9ee1b956f373eb60d6172698b4711d2a6e
SHA2560518b38a92b060e5a560cd43e41a1c9a1d4244b028ccfbeaf9253d319cd6b6e6
SHA512e3fd22fbee7023e9c46bc94878ccf6d8e1d5ac46ba861152cfb3f0b446a80eaa84455eae502fa3f2ace883a379243d3a9ce04354f8bb776f6e7d65f510022ba6
-
Filesize
114KB
MD58ba9f24d250dcd6b87bf024f5f4461a1
SHA1b083a264b2876c2b3ff326bf0e41e2b51b37dac1
SHA25695968131a48985f4e595a5c1b8f029846e46ead550750f8d5869c43220c875e1
SHA512461097299941184f858071b96680bb2acf7f780def87692cc1e1c340b1e143b0855b1dd9484627908597227b865c7a5ba7fd67937a6816eac2ed9aa0fad838e3
-
Filesize
1KB
MD534a5f8f7e9db6e222ca186f27a3dc98a
SHA1b2bc4310e0f7f53716782bfdb46e1e2f0100a9da
SHA256579b6d95cdb7a55932dea0bf3b978dfcd44f31932fc7b7529193b3600e153767
SHA512e0e2bf3ba13653eb1e327ac820febf57023d3fb29de2f86e2ba5a8c3179034c89f61ccb374021a77ade90ae392b9a00f463e92b5509e46eec38552b7410c1752
-
Filesize
88KB
MD567632c6940adfb2468e2d33bc46edea2
SHA1294da32027090106e1da4978a112b35c7fc15e7f
SHA256d49dc952efaedd8e724b7a933dcc535e224d918e9d9ab227a68dd5bad83c3e9b
SHA5125d43a5cd2cd57ffb14f6b7c974e276ea32323a4908506fb084317700bb64f5b4ed7da683833bfef459c9391b5962a59bb8fd8db365cb4504044b8701ae5da4f4