Analysis
-
max time kernel
2s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:05
Behavioral task
behavioral1
Sample
228bc8ce576fa66644f2234d99f452ae.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
228bc8ce576fa66644f2234d99f452ae.exe
Resource
win10v2004-20231215-en
General
-
Target
228bc8ce576fa66644f2234d99f452ae.exe
-
Size
2.0MB
-
MD5
228bc8ce576fa66644f2234d99f452ae
-
SHA1
f1dea84b89710487ff33bdacb4ce399f7fc3984b
-
SHA256
4c7ac17a3071340120492ad1dc939e76a74024b66b9eb5e6d240882ec0d5f794
-
SHA512
b1f441b26febd9d9b32fdd8a7d2580a79dcbda647365fb90a2914ef24cbe3da8a5c6b0a881a4ce99cc167bea9ab3311b79833fca7f55c4f097f749b278008e4b
-
SSDEEP
49152:vhLgYDov4FqOgKE45NHxrHoGQ7ai7D3xTgOxYwpKA17HUTGQ7ai7D3xTgOxYwpK:vhLgY6qqOgKT/RHoD2i7D3xkOxYwpKA/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 228bc8ce576fa66644f2234d99f452ae.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 228bc8ce576fa66644f2234d99f452ae.exe -
Loads dropped DLL 1 IoCs
pid Process 824 228bc8ce576fa66644f2234d99f452ae.exe -
resource yara_rule behavioral1/memory/824-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c0000000122f0-14.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 824 228bc8ce576fa66644f2234d99f452ae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 824 228bc8ce576fa66644f2234d99f452ae.exe 2192 228bc8ce576fa66644f2234d99f452ae.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 824 wrote to memory of 2192 824 228bc8ce576fa66644f2234d99f452ae.exe 15 PID 824 wrote to memory of 2192 824 228bc8ce576fa66644f2234d99f452ae.exe 15 PID 824 wrote to memory of 2192 824 228bc8ce576fa66644f2234d99f452ae.exe 15 PID 824 wrote to memory of 2192 824 228bc8ce576fa66644f2234d99f452ae.exe 15 PID 2192 wrote to memory of 2592 2192 228bc8ce576fa66644f2234d99f452ae.exe 17 PID 2192 wrote to memory of 2592 2192 228bc8ce576fa66644f2234d99f452ae.exe 17 PID 2192 wrote to memory of 2592 2192 228bc8ce576fa66644f2234d99f452ae.exe 17 PID 2192 wrote to memory of 2592 2192 228bc8ce576fa66644f2234d99f452ae.exe 17 PID 2192 wrote to memory of 2652 2192 228bc8ce576fa66644f2234d99f452ae.exe 20 PID 2192 wrote to memory of 2652 2192 228bc8ce576fa66644f2234d99f452ae.exe 20 PID 2192 wrote to memory of 2652 2192 228bc8ce576fa66644f2234d99f452ae.exe 20 PID 2192 wrote to memory of 2652 2192 228bc8ce576fa66644f2234d99f452ae.exe 20 PID 2652 wrote to memory of 2720 2652 cmd.exe 18 PID 2652 wrote to memory of 2720 2652 cmd.exe 18 PID 2652 wrote to memory of 2720 2652 cmd.exe 18 PID 2652 wrote to memory of 2720 2652 cmd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\228bc8ce576fa66644f2234d99f452ae.exeC:\Users\Admin\AppData\Local\Temp\228bc8ce576fa66644f2234d99f452ae.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\228bc8ce576fa66644f2234d99f452ae.exe" /TN 6ek6uOO9da42 /F2⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\Yrjga.xml2⤵
- Suspicious use of WriteProcessMemory
PID:2652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da421⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\228bc8ce576fa66644f2234d99f452ae.exe"C:\Users\Admin\AppData\Local\Temp\228bc8ce576fa66644f2234d99f452ae.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:824