Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:27
Behavioral task
behavioral1
Sample
21ad3369268451754adf43c80180d2d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21ad3369268451754adf43c80180d2d0.exe
Resource
win10v2004-20231215-en
General
-
Target
21ad3369268451754adf43c80180d2d0.exe
-
Size
1003KB
-
MD5
21ad3369268451754adf43c80180d2d0
-
SHA1
d4d8c1b38d2737c1c4b735bae0b80c87082d8381
-
SHA256
93a3c557083326e27e7ca3182ed65c387da2ce32c095d583d42e0bacc672d579
-
SHA512
8069d111015cbbfbe90fdf5650e350fedbce3e15989e0272b055b43e877b984f621b0ef789d47385cd6ac7094ff4b6607a981c45ac547a2aa0eb07c59ed8157f
-
SSDEEP
24576:5x2aO+ku9Z//MVGQoadai7D3uITjIFOxo53ApIj:69+km3MVGQ7ai7D3xTgOxYwpK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2708 21ad3369268451754adf43c80180d2d0.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 21ad3369268451754adf43c80180d2d0.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 21ad3369268451754adf43c80180d2d0.exe -
resource yara_rule behavioral1/memory/3004-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001224d-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 21ad3369268451754adf43c80180d2d0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 21ad3369268451754adf43c80180d2d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 21ad3369268451754adf43c80180d2d0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 21ad3369268451754adf43c80180d2d0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3004 21ad3369268451754adf43c80180d2d0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3004 21ad3369268451754adf43c80180d2d0.exe 2708 21ad3369268451754adf43c80180d2d0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2708 3004 21ad3369268451754adf43c80180d2d0.exe 29 PID 3004 wrote to memory of 2708 3004 21ad3369268451754adf43c80180d2d0.exe 29 PID 3004 wrote to memory of 2708 3004 21ad3369268451754adf43c80180d2d0.exe 29 PID 3004 wrote to memory of 2708 3004 21ad3369268451754adf43c80180d2d0.exe 29 PID 2708 wrote to memory of 2696 2708 21ad3369268451754adf43c80180d2d0.exe 30 PID 2708 wrote to memory of 2696 2708 21ad3369268451754adf43c80180d2d0.exe 30 PID 2708 wrote to memory of 2696 2708 21ad3369268451754adf43c80180d2d0.exe 30 PID 2708 wrote to memory of 2696 2708 21ad3369268451754adf43c80180d2d0.exe 30 PID 2708 wrote to memory of 2852 2708 21ad3369268451754adf43c80180d2d0.exe 34 PID 2708 wrote to memory of 2852 2708 21ad3369268451754adf43c80180d2d0.exe 34 PID 2708 wrote to memory of 2852 2708 21ad3369268451754adf43c80180d2d0.exe 34 PID 2708 wrote to memory of 2852 2708 21ad3369268451754adf43c80180d2d0.exe 34 PID 2852 wrote to memory of 2964 2852 cmd.exe 32 PID 2852 wrote to memory of 2964 2852 cmd.exe 32 PID 2852 wrote to memory of 2964 2852 cmd.exe 32 PID 2852 wrote to memory of 2964 2852 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ad3369268451754adf43c80180d2d0.exe"C:\Users\Admin\AppData\Local\Temp\21ad3369268451754adf43c80180d2d0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\21ad3369268451754adf43c80180d2d0.exeC:\Users\Admin\AppData\Local\Temp\21ad3369268451754adf43c80180d2d0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\21ad3369268451754adf43c80180d2d0.exe" /TN QxutJGth3fd4 /F3⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\2w3mh2Om.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2852
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5278af1cfbc401d8f82843245110beeec
SHA1e1ca696908ab89dd04d6e75e0d3aedd962080869
SHA25632b2ddd1004ccd8c0047513bf8534b02c4652ae570f5c3c5779f112b82acf614
SHA5128c66b974780e2e9dd013dfb6a43d6a9697d748ce98cbca936a43e0562239ae10ef1a48014b1b5f7827847820674515ca66761db61d8c0fb40d17092f195ac17e
-
Filesize
1003KB
MD5c660e531760235d1361f3b4988ddc0ab
SHA1460ccc273ce832d0fefb7a04e126538f6b9af232
SHA25687ee256e77e9e60aab9fabbefa99b8b2fe72ffa82ccf816031625a4a86395a8f
SHA512ffbf6c571c852cbd9d07bc4a8948c327af428f39b978bd913584835803127f38672f5c495d6d6a294551baf5ce629995d7c62262ea9111b2d7c1840f37efc169