Analysis
-
max time kernel
5s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:13
Behavioral task
behavioral1
Sample
10cce40864c5058de7d852f5c3f4b151.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10cce40864c5058de7d852f5c3f4b151.exe
Resource
win10v2004-20231215-en
General
-
Target
10cce40864c5058de7d852f5c3f4b151.exe
-
Size
6.4MB
-
MD5
10cce40864c5058de7d852f5c3f4b151
-
SHA1
7bfdb60916a1b8adb7271132a84f9282a07eaee2
-
SHA256
19488a19d1ee59c9f1e1d29692595eb4a94a20a04fb0765016c7213cce8b98d3
-
SHA512
98f99330efc32a307175fbd1fcb90ebc6f8a0511fde119fb15bd02629168162bbb472ee9ea82479527425bfe7f7e29b9b10122f9a90e3edad67b73425ad41a5b
-
SSDEEP
196608:aA0NA/dltO5I+vEBudlvBlJ7kdltO5I+vEBudlyvoxT0QdltO5I+vEBudlvBlJ74:axOyI+vuiJUyI+vuNvoxThyI+vuiJUy0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 10cce40864c5058de7d852f5c3f4b151.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 10cce40864c5058de7d852f5c3f4b151.exe -
Loads dropped DLL 1 IoCs
pid Process 2252 10cce40864c5058de7d852f5c3f4b151.exe -
resource yara_rule behavioral1/memory/2252-1-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2252 10cce40864c5058de7d852f5c3f4b151.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2252 10cce40864c5058de7d852f5c3f4b151.exe 3068 10cce40864c5058de7d852f5c3f4b151.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3068 2252 10cce40864c5058de7d852f5c3f4b151.exe 21 PID 2252 wrote to memory of 3068 2252 10cce40864c5058de7d852f5c3f4b151.exe 21 PID 2252 wrote to memory of 3068 2252 10cce40864c5058de7d852f5c3f4b151.exe 21 PID 2252 wrote to memory of 3068 2252 10cce40864c5058de7d852f5c3f4b151.exe 21 PID 3068 wrote to memory of 2620 3068 10cce40864c5058de7d852f5c3f4b151.exe 17 PID 3068 wrote to memory of 2620 3068 10cce40864c5058de7d852f5c3f4b151.exe 17 PID 3068 wrote to memory of 2620 3068 10cce40864c5058de7d852f5c3f4b151.exe 17 PID 3068 wrote to memory of 2620 3068 10cce40864c5058de7d852f5c3f4b151.exe 17 PID 3068 wrote to memory of 2716 3068 10cce40864c5058de7d852f5c3f4b151.exe 18 PID 3068 wrote to memory of 2716 3068 10cce40864c5058de7d852f5c3f4b151.exe 18 PID 3068 wrote to memory of 2716 3068 10cce40864c5058de7d852f5c3f4b151.exe 18 PID 3068 wrote to memory of 2716 3068 10cce40864c5058de7d852f5c3f4b151.exe 18 PID 2716 wrote to memory of 2744 2716 cmd.exe 19 PID 2716 wrote to memory of 2744 2716 cmd.exe 19 PID 2716 wrote to memory of 2744 2716 cmd.exe 19 PID 2716 wrote to memory of 2744 2716 cmd.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\10cce40864c5058de7d852f5c3f4b151.exe"C:\Users\Admin\AppData\Local\Temp\10cce40864c5058de7d852f5c3f4b151.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\10cce40864c5058de7d852f5c3f4b151.exeC:\Users\Admin\AppData\Local\Temp\10cce40864c5058de7d852f5c3f4b151.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\10cce40864c5058de7d852f5c3f4b151.exe" /TN qm2lmOfce5f6 /F1⤵
- Creates scheduled task(s)
PID:2620
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\AWwIOawnb.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f62⤵PID:2744
-