Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:54
Behavioral task
behavioral1
Sample
255265e5d8f50c240ae6f2c3b5c6b744.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
255265e5d8f50c240ae6f2c3b5c6b744.exe
Resource
win10v2004-20231215-en
General
-
Target
255265e5d8f50c240ae6f2c3b5c6b744.exe
-
Size
3.0MB
-
MD5
255265e5d8f50c240ae6f2c3b5c6b744
-
SHA1
62dfd320bd552503f73294b65af5e3298bbea54f
-
SHA256
4437d83c1d5a03becedf30e0553a7c65bcff35d0232302c78fd2320db70a4027
-
SHA512
109f722062a9d42c06e895fdeeb1bd84e04c3ba8e2dad26f4b89d5445216d99a385addd580f6f701fff73cde9dd77fe725cc3b0754fe3a8135c2dd9ebd7aa306
-
SSDEEP
49152:Fr55r6EZskX5fo56ncakLoY4fIKSW6TItcakL62XgNzcwO2RmBoV8cakLoY4fIKw:Fr55TZsU5fu6ncakH4fInW6McakpXgNX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe -
Executes dropped EXE 1 IoCs
pid Process 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 255265e5d8f50c240ae6f2c3b5c6b744.exe -
resource yara_rule behavioral1/memory/1964-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001220d-11.dat upx behavioral1/files/0x000a00000001220d-17.dat upx behavioral1/memory/1964-16-0x0000000023430000-0x000000002368C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 255265e5d8f50c240ae6f2c3b5c6b744.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 255265e5d8f50c240ae6f2c3b5c6b744.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 255265e5d8f50c240ae6f2c3b5c6b744.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 255265e5d8f50c240ae6f2c3b5c6b744.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1964 255265e5d8f50c240ae6f2c3b5c6b744.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1964 255265e5d8f50c240ae6f2c3b5c6b744.exe 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2628 1964 255265e5d8f50c240ae6f2c3b5c6b744.exe 29 PID 1964 wrote to memory of 2628 1964 255265e5d8f50c240ae6f2c3b5c6b744.exe 29 PID 1964 wrote to memory of 2628 1964 255265e5d8f50c240ae6f2c3b5c6b744.exe 29 PID 1964 wrote to memory of 2628 1964 255265e5d8f50c240ae6f2c3b5c6b744.exe 29 PID 2628 wrote to memory of 2652 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 31 PID 2628 wrote to memory of 2652 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 31 PID 2628 wrote to memory of 2652 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 31 PID 2628 wrote to memory of 2652 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 31 PID 2628 wrote to memory of 2668 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 34 PID 2628 wrote to memory of 2668 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 34 PID 2628 wrote to memory of 2668 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 34 PID 2628 wrote to memory of 2668 2628 255265e5d8f50c240ae6f2c3b5c6b744.exe 34 PID 2668 wrote to memory of 2588 2668 cmd.exe 33 PID 2668 wrote to memory of 2588 2668 cmd.exe 33 PID 2668 wrote to memory of 2588 2668 cmd.exe 33 PID 2668 wrote to memory of 2588 2668 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\255265e5d8f50c240ae6f2c3b5c6b744.exe"C:\Users\Admin\AppData\Local\Temp\255265e5d8f50c240ae6f2c3b5c6b744.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\255265e5d8f50c240ae6f2c3b5c6b744.exeC:\Users\Admin\AppData\Local\Temp\255265e5d8f50c240ae6f2c3b5c6b744.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\255265e5d8f50c240ae6f2c3b5c6b744.exe" /TN 6ek6uOO9da42 /F3⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\oJzZduAor.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2668
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da421⤵PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD598dec6a7ffd18bf3b3e2d284c3d19890
SHA11a22159553fe63fe01f7cf968557cfa21a6c437b
SHA2560a5c521e59123b222129032554bd5c10cdba00882894ca2184bee99400f603c5
SHA5120370a6615138c1f76c9062d011d44ef6ad9c7f898efcba57e54bf154195da2a6355de29b01eb3c0a04db1302f81e26818332b4164395e95d34cc6702f4ee1cc9
-
Filesize
1KB
MD5acd8f8f7d9e0b993d3b130c9cd6c8966
SHA1195bc5493b34b0659330f7bf6d08fbb56d3cce6b
SHA256f1ee23ce2f89cd8cd6914df11be34222f427287809bb6e205f82630891274c83
SHA512e033ad698bc29dc01f2c064d618e0a5d7d08baf8569b0f6b1a2f4b97d0a9133d847622f5512c2decdfe8ff646d4f316498990655e8228ff17cfdfc4d7459c4ed
-
Filesize
641KB
MD5b457631bbd5176b28c29f80e4a41fd59
SHA10e156f69480ece60e51f3393c69226949009a6e1
SHA256065528781e075c962b0488eadb0a4782d5f0ab29a831becd7360e6f073786be4
SHA512f36db5b3d61cae164903d74c4b70014943ae1fa8293c69619f3b9840c6a3392856b60d266e359627cf89be7d9bad7fb535209f6ec48e283717733ff448fcd16a