Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:10
Behavioral task
behavioral1
Sample
0dfb3f58e38847129e415d66bb8d6d0d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0dfb3f58e38847129e415d66bb8d6d0d.exe
Resource
win10v2004-20231215-en
General
-
Target
0dfb3f58e38847129e415d66bb8d6d0d.exe
-
Size
7.8MB
-
MD5
0dfb3f58e38847129e415d66bb8d6d0d
-
SHA1
85cc78bd0793b0b92a826bc281d70131e1c38975
-
SHA256
c1566abc174a19e33a0db71b201da4ed9b419686f78ef317c9f40c90dde5ade2
-
SHA512
696937b37b2993ce5eab873106e313b91943473da2120d12be92b2007c9804a5d16875c379eb9342a716e08b367ebaf1eb3d120d59bb567f32c625247a794bf6
-
SSDEEP
196608:w3YTdlirYeeMkdlirfcGMdlirYeeMkdlir6LyYJMsfCdlirYeeMkdlirfcGMdliF:v0Be2mxB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 0dfb3f58e38847129e415d66bb8d6d0d.exe -
resource yara_rule behavioral1/memory/2748-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000013a1a-11.dat upx behavioral1/files/0x000a000000013a1a-17.dat upx behavioral1/memory/2748-16-0x0000000023F70000-0x00000000241CC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3020 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 0dfb3f58e38847129e415d66bb8d6d0d.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 0dfb3f58e38847129e415d66bb8d6d0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 0dfb3f58e38847129e415d66bb8d6d0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 0dfb3f58e38847129e415d66bb8d6d0d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2748 0dfb3f58e38847129e415d66bb8d6d0d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2748 0dfb3f58e38847129e415d66bb8d6d0d.exe 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2992 2748 0dfb3f58e38847129e415d66bb8d6d0d.exe 34 PID 2748 wrote to memory of 2992 2748 0dfb3f58e38847129e415d66bb8d6d0d.exe 34 PID 2748 wrote to memory of 2992 2748 0dfb3f58e38847129e415d66bb8d6d0d.exe 34 PID 2748 wrote to memory of 2992 2748 0dfb3f58e38847129e415d66bb8d6d0d.exe 34 PID 2992 wrote to memory of 3020 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 30 PID 2992 wrote to memory of 3020 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 30 PID 2992 wrote to memory of 3020 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 30 PID 2992 wrote to memory of 3020 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 30 PID 2992 wrote to memory of 2608 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 33 PID 2992 wrote to memory of 2608 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 33 PID 2992 wrote to memory of 2608 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 33 PID 2992 wrote to memory of 2608 2992 0dfb3f58e38847129e415d66bb8d6d0d.exe 33 PID 2608 wrote to memory of 2688 2608 cmd.exe 31 PID 2608 wrote to memory of 2688 2608 cmd.exe 31 PID 2608 wrote to memory of 2688 2608 cmd.exe 31 PID 2608 wrote to memory of 2688 2608 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dfb3f58e38847129e415d66bb8d6d0d.exe"C:\Users\Admin\AppData\Local\Temp\0dfb3f58e38847129e415d66bb8d6d0d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\0dfb3f58e38847129e415d66bb8d6d0d.exeC:\Users\Admin\AppData\Local\Temp\0dfb3f58e38847129e415d66bb8d6d0d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0dfb3f58e38847129e415d66bb8d6d0d.exe" /TN qm2lmOfce5f6 /F1⤵
- Creates scheduled task(s)
PID:3020
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\NRMlOzu9.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD53c0b504f6089c675d60d773dc4c0b54e
SHA13f34ea610d6c41c833e77f2e2b4d4ab1c12f81cf
SHA2565b8c7f08c5962589fd62bbdccb5789b7e8902addda35cd0d7687e6c8f39e26df
SHA51254123336322fa52519b9194ba5f74dcfd24676a919340655ef421766821614873fdf3a2158e0608a344a0bff186e6bd4a95bc7c4c238f1f6044a60fdb07b1fc6
-
Filesize
375KB
MD5440ca54cbcf577f285f948f6dc56306c
SHA16abe54416616656f6d67881345528620806de441
SHA256117e1cea0395b7633351791ad908f57ed47f64f8209be352413ceac65def5c37
SHA5128a20b5ca8e15476ff32d6d5d24e4d1cfd77b3410fe0ba749bcb3ae54ce6f91e1866001d17b2fb4199cab7ffd7222634dac2e3409fda47677cb61099d22c82486