Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:28
Static task
static1
Behavioral task
behavioral1
Sample
247b2c1b9fbba0979f60eebfd523cd30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
247b2c1b9fbba0979f60eebfd523cd30.exe
Resource
win10v2004-20231215-en
General
-
Target
247b2c1b9fbba0979f60eebfd523cd30.exe
-
Size
907KB
-
MD5
247b2c1b9fbba0979f60eebfd523cd30
-
SHA1
090bc7ec17693ac1daf57617aa4bf73381757446
-
SHA256
2f6d0c2ee294b65e05374e0c61b6235e8d1b80b1e77e147b223191f763d0fbdc
-
SHA512
a7a820dd49e2be8154371bd1f9502d6b4606b5cdcdb61edc0786f37427ae056e73b3ee55a46680b6e9c12ee804f45e19b8b5b8f4d80386e5c24355ca587cd6a1
-
SSDEEP
24576:ZloFJ0S6dLA1+sifYvZBHsdkg8FbSa/ZS1:LoFJILAdk0jgCSgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 247b2c1b9fbba0979f60eebfd523cd30.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 247b2c1b9fbba0979f60eebfd523cd30.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 247b2c1b9fbba0979f60eebfd523cd30.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 247b2c1b9fbba0979f60eebfd523cd30.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 247b2c1b9fbba0979f60eebfd523cd30.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 247b2c1b9fbba0979f60eebfd523cd30.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2100 247b2c1b9fbba0979f60eebfd523cd30.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2100 247b2c1b9fbba0979f60eebfd523cd30.exe 2696 247b2c1b9fbba0979f60eebfd523cd30.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2696 2100 247b2c1b9fbba0979f60eebfd523cd30.exe 21 PID 2100 wrote to memory of 2696 2100 247b2c1b9fbba0979f60eebfd523cd30.exe 21 PID 2100 wrote to memory of 2696 2100 247b2c1b9fbba0979f60eebfd523cd30.exe 21 PID 2100 wrote to memory of 2696 2100 247b2c1b9fbba0979f60eebfd523cd30.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exe"C:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exeC:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5dae55d89daec695622de2294924a7076
SHA16aefa5745a69e916872faa79c08cff5d6dc06d35
SHA256717bc4f5abdfd8f9327bedc1b7052263a9f8a6197b07f90779b7183756df9fa7
SHA512bd98eceb05eac7234a43ac1e6075e71ac9b49aba6c8ea486fb417f8d8f3e8ceacdcb6e3f30c528acd9e6aff13714bf258cb2bcc974abeef48014eb996355eb13
-
Filesize
713KB
MD55c576b4357339727f995a376b592856f
SHA17cbe71b6adada2fc09299fd3bbfded6f78d71cd6
SHA256e4440c3da5812fddb9b850229756faa96766c99626049c92e6944402ceada0e6
SHA512d26222d874fa9254a9efdb3393127b3db77ca3a584eea575871fe8b9a8123bfd96388f2a69d4a7e9c5ae7fc9cb8b64bab398bbcb8f83af667139a92b488a445c