Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 13:12
Behavioral task
behavioral1
Sample
199404aa9aade113bc495338881812c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
199404aa9aade113bc495338881812c4.exe
Resource
win10v2004-20231222-en
General
-
Target
199404aa9aade113bc495338881812c4.exe
-
Size
1003KB
-
MD5
199404aa9aade113bc495338881812c4
-
SHA1
654ab5ba4b745f29174fa4339f07509f5ac165d4
-
SHA256
35fcd5d3e5351fb0a18374d9592e6b0ff48b2d6cbf799cd9fb479d76edb663b1
-
SHA512
afd55a59d1a5741e063e34d88d8aa5fc60473fae46fb3c2c3774e415b07c641b8602f43a2e5f76323901923d436480a29d6ebb6d7c530b148aa7d2ba912048a2
-
SSDEEP
24576:ZzDJO/kcbTcXjivwCgGcjukL2CDYibq6/yqLNaF:9DinbwXj6wccakLz0ibq6yqh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 199404aa9aade113bc495338881812c4.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 199404aa9aade113bc495338881812c4.exe -
Loads dropped DLL 1 IoCs
pid Process 3052 199404aa9aade113bc495338881812c4.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001224d-14.dat upx behavioral1/files/0x000b00000001224d-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1972 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 199404aa9aade113bc495338881812c4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 199404aa9aade113bc495338881812c4.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 199404aa9aade113bc495338881812c4.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 199404aa9aade113bc495338881812c4.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3052 199404aa9aade113bc495338881812c4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3052 199404aa9aade113bc495338881812c4.exe 2712 199404aa9aade113bc495338881812c4.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2712 3052 199404aa9aade113bc495338881812c4.exe 16 PID 3052 wrote to memory of 2712 3052 199404aa9aade113bc495338881812c4.exe 16 PID 3052 wrote to memory of 2712 3052 199404aa9aade113bc495338881812c4.exe 16 PID 3052 wrote to memory of 2712 3052 199404aa9aade113bc495338881812c4.exe 16 PID 2712 wrote to memory of 1972 2712 199404aa9aade113bc495338881812c4.exe 19 PID 2712 wrote to memory of 1972 2712 199404aa9aade113bc495338881812c4.exe 19 PID 2712 wrote to memory of 1972 2712 199404aa9aade113bc495338881812c4.exe 19 PID 2712 wrote to memory of 1972 2712 199404aa9aade113bc495338881812c4.exe 19 PID 2712 wrote to memory of 2796 2712 199404aa9aade113bc495338881812c4.exe 22 PID 2712 wrote to memory of 2796 2712 199404aa9aade113bc495338881812c4.exe 22 PID 2712 wrote to memory of 2796 2712 199404aa9aade113bc495338881812c4.exe 22 PID 2712 wrote to memory of 2796 2712 199404aa9aade113bc495338881812c4.exe 22 PID 2796 wrote to memory of 2900 2796 cmd.exe 21 PID 2796 wrote to memory of 2900 2796 cmd.exe 21 PID 2796 wrote to memory of 2900 2796 cmd.exe 21 PID 2796 wrote to memory of 2900 2796 cmd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\199404aa9aade113bc495338881812c4.exe"C:\Users\Admin\AppData\Local\Temp\199404aa9aade113bc495338881812c4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\199404aa9aade113bc495338881812c4.exeC:\Users\Admin\AppData\Local\Temp\199404aa9aade113bc495338881812c4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\199404aa9aade113bc495338881812c4.exe" /TN QxutJGth3fd4 /F3⤵
- Creates scheduled task(s)
PID:1972
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\VG89gbaSy.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2796
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5760785d83d854fb2758d23835e3c9fc5
SHA1d95aae3fcc7d00e3d5e856df83c18ea6fdff9d35
SHA256b160cbabd2c03e0d5e095d63ecd3fff76ca186e468eec220f0f18a76e36f7c20
SHA512e3b7cce1d74e3303ac996f60e5b310ce95c85bef7d99dd715226dc648dc7faa48a26528c6092a8338936531c59341d9244563bf507b699cb56f587914ba2af22
-
Filesize
859KB
MD5fe74a3ff9af5a85a45ebb8e41db29d25
SHA108da9570cc72e36c25dde52e1a935307bd592252
SHA2563e089ddf9faacc27ad737a24f8f7873aa154645fcfb568cf4f6a4377080c162c
SHA5123da3be9b9825fe0efaacd90acf56ac5376a4c79d9bc6bfbadec53221d5f64448358682f798e32c330336f4e62244264a7cc3eca44548fa72a44b7e125e7f67fa