Analysis
-
max time kernel
1s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:35
Behavioral task
behavioral1
Sample
2035094dbc8e51637f203de6722106bc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2035094dbc8e51637f203de6722106bc.exe
Resource
win10v2004-20231215-en
General
-
Target
2035094dbc8e51637f203de6722106bc.exe
-
Size
3.9MB
-
MD5
2035094dbc8e51637f203de6722106bc
-
SHA1
b52018c0173f43b39d8d9caa460a05586a7080af
-
SHA256
0957f402319731d6d9130e4d5d295c8768d26734fb33f4497e43edb50bcbe4b4
-
SHA512
dd2d95bb57abfa568b24a1a81379ec6858bdf0a5fb6d6b561e5ab1165258c0d8f3975ef7529e16c1c8be8ff6803f752c8d3b639968f4dacfde4464b88979d096
-
SSDEEP
98304:KVKbM2ieGSA9zyULG+e+djJ8uskbJA9zyULG+R3pnZ9y0+hRbZA9zyULG+e+djJ8:KVKbM9zLqf+Nx1b2zLqspv+yzLqf+Nxt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 2035094dbc8e51637f203de6722106bc.exe -
Executes dropped EXE 1 IoCs
pid Process 2040 2035094dbc8e51637f203de6722106bc.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 2035094dbc8e51637f203de6722106bc.exe -
resource yara_rule behavioral1/memory/2536-16-0x0000000023590000-0x00000000237EC000-memory.dmp upx behavioral1/memory/2536-0-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2536 2035094dbc8e51637f203de6722106bc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2536 2035094dbc8e51637f203de6722106bc.exe 2040 2035094dbc8e51637f203de6722106bc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2040 2536 2035094dbc8e51637f203de6722106bc.exe 17 PID 2536 wrote to memory of 2040 2536 2035094dbc8e51637f203de6722106bc.exe 17 PID 2536 wrote to memory of 2040 2536 2035094dbc8e51637f203de6722106bc.exe 17 PID 2536 wrote to memory of 2040 2536 2035094dbc8e51637f203de6722106bc.exe 17 PID 2040 wrote to memory of 2596 2040 2035094dbc8e51637f203de6722106bc.exe 19 PID 2040 wrote to memory of 2596 2040 2035094dbc8e51637f203de6722106bc.exe 19 PID 2040 wrote to memory of 2596 2040 2035094dbc8e51637f203de6722106bc.exe 19 PID 2040 wrote to memory of 2596 2040 2035094dbc8e51637f203de6722106bc.exe 19 PID 2040 wrote to memory of 2660 2040 2035094dbc8e51637f203de6722106bc.exe 22 PID 2040 wrote to memory of 2660 2040 2035094dbc8e51637f203de6722106bc.exe 22 PID 2040 wrote to memory of 2660 2040 2035094dbc8e51637f203de6722106bc.exe 22 PID 2040 wrote to memory of 2660 2040 2035094dbc8e51637f203de6722106bc.exe 22 PID 2660 wrote to memory of 2684 2660 cmd.exe 20 PID 2660 wrote to memory of 2684 2660 cmd.exe 20 PID 2660 wrote to memory of 2684 2660 cmd.exe 20 PID 2660 wrote to memory of 2684 2660 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2035094dbc8e51637f203de6722106bc.exeC:\Users\Admin\AppData\Local\Temp\2035094dbc8e51637f203de6722106bc.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2035094dbc8e51637f203de6722106bc.exe" /TN qm2lmOfce5f6 /F2⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\8EXeo.xml2⤵
- Suspicious use of WriteProcessMemory
PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2035094dbc8e51637f203de6722106bc.exe"C:\Users\Admin\AppData\Local\Temp\2035094dbc8e51637f203de6722106bc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2536