Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:07
Behavioral task
behavioral1
Sample
295eb3af3e737c859414ab9c74ce8769.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
295eb3af3e737c859414ab9c74ce8769.exe
Resource
win10v2004-20231215-en
General
-
Target
295eb3af3e737c859414ab9c74ce8769.exe
-
Size
1003KB
-
MD5
295eb3af3e737c859414ab9c74ce8769
-
SHA1
93b9045aefa29dca06d3fb0b729c54c8dc835de0
-
SHA256
a30404e4d38184c5cea0d21e7449158dfc46599bc649f93018b5c1ea070292c3
-
SHA512
7f8ea01c85e7afbc9df92555bc433b0a4f7fbb282a611957d35b33c4d7745ce75d54cf99b520b00662f2f62c0290a09423eda586ab830993e9b4669a81390d95
-
SSDEEP
24576:hxfhXj13pEyt1yrZYQDgMicH5f+64JRWFULCD+:hxfhXh3pbt1yrZYQDJicN+9zWFULG+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1504 295eb3af3e737c859414ab9c74ce8769.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 295eb3af3e737c859414ab9c74ce8769.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 295eb3af3e737c859414ab9c74ce8769.exe -
resource yara_rule behavioral1/memory/1964-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/1964-16-0x0000000022F20000-0x000000002317C000-memory.dmp upx behavioral1/files/0x00080000000120f8-13.dat upx behavioral1/files/0x00080000000120f8-11.dat upx behavioral1/files/0x00080000000120f8-17.dat upx behavioral1/memory/1504-19-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 295eb3af3e737c859414ab9c74ce8769.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 295eb3af3e737c859414ab9c74ce8769.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 295eb3af3e737c859414ab9c74ce8769.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 295eb3af3e737c859414ab9c74ce8769.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1964 295eb3af3e737c859414ab9c74ce8769.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1964 295eb3af3e737c859414ab9c74ce8769.exe 1504 295eb3af3e737c859414ab9c74ce8769.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1504 1964 295eb3af3e737c859414ab9c74ce8769.exe 29 PID 1964 wrote to memory of 1504 1964 295eb3af3e737c859414ab9c74ce8769.exe 29 PID 1964 wrote to memory of 1504 1964 295eb3af3e737c859414ab9c74ce8769.exe 29 PID 1964 wrote to memory of 1504 1964 295eb3af3e737c859414ab9c74ce8769.exe 29 PID 1504 wrote to memory of 2808 1504 295eb3af3e737c859414ab9c74ce8769.exe 30 PID 1504 wrote to memory of 2808 1504 295eb3af3e737c859414ab9c74ce8769.exe 30 PID 1504 wrote to memory of 2808 1504 295eb3af3e737c859414ab9c74ce8769.exe 30 PID 1504 wrote to memory of 2808 1504 295eb3af3e737c859414ab9c74ce8769.exe 30 PID 1504 wrote to memory of 2712 1504 295eb3af3e737c859414ab9c74ce8769.exe 32 PID 1504 wrote to memory of 2712 1504 295eb3af3e737c859414ab9c74ce8769.exe 32 PID 1504 wrote to memory of 2712 1504 295eb3af3e737c859414ab9c74ce8769.exe 32 PID 1504 wrote to memory of 2712 1504 295eb3af3e737c859414ab9c74ce8769.exe 32 PID 2712 wrote to memory of 2628 2712 cmd.exe 34 PID 2712 wrote to memory of 2628 2712 cmd.exe 34 PID 2712 wrote to memory of 2628 2712 cmd.exe 34 PID 2712 wrote to memory of 2628 2712 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\295eb3af3e737c859414ab9c74ce8769.exe"C:\Users\Admin\AppData\Local\Temp\295eb3af3e737c859414ab9c74ce8769.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\295eb3af3e737c859414ab9c74ce8769.exeC:\Users\Admin\AppData\Local\Temp\295eb3af3e737c859414ab9c74ce8769.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\295eb3af3e737c859414ab9c74ce8769.exe" /TN Nnb8kaFf43a4 /F3⤵
- Creates scheduled task(s)
PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN Nnb8kaFf43a4 > C:\Users\Admin\AppData\Local\Temp\46KyZQ7i.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN Nnb8kaFf43a44⤵PID:2628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD59f4cfae279c401428d78eae08e6a064d
SHA19425f39c2a96ffea589e9e304ce9768d188b13e9
SHA256bce6e49c3e3ab16dbee2653a677b941ee078190c51aeb60936a0eb38a190692f
SHA5121d5896f5f15ad214ed228189a85b7eea0041a99e05ac153b1b52f8a0fc4ef1f9a29bd35573572ae34b325752a0af2dc6714730c9d98d44841aaa9f726d7c62a8
-
Filesize
246KB
MD571fa97a1fbdc997ca4959728a370a02f
SHA11f366494e1b2e99c4600d7ecd5ee4cb57e092acb
SHA256804f897707671852343e3248ae65e5b41fda386efee16d7a0a9b79857a424cab
SHA5129ce403514eb76bf8bbb457a4cd0e3a52410fa84fc3a508fb9131d37eeb9560b8d8a1888dc254070e7041deb68bf5d95aaa11bc0c36e79c9392a9bdfdcf39911f
-
Filesize
1KB
MD548d4b72b679b0549c72c2f4596fe9e81
SHA1952902c4dee99a42eadde2b0f06f9115aa44b243
SHA256e523104560bf1017dae7d08c3cffcb3de482aac58a30be6e9066596f3f0ee1f8
SHA5126ff6565da5896897f3fa13756d211f2cfa2c4037d7d08604061170973af5c177d37b16d2f55fba07a04cad662155be85375b4824ebc9da6c92c73bc5c245c69f
-
Filesize
336KB
MD50a897abcdabcdb6c9649871c2d7f03d0
SHA17f373a03c13e7980b7c72611e362e4afd636ab1f
SHA25600283b8d1e5b97c6c66aacb367b577ed39dab552e2097f4d004799c2ff63fbfa
SHA512ae0f36b3079d7fcf0c9f93ae4f5ba007cf56f6b797d551f8f8d683c839cda162a779511860c6f742cd00e09115fc9cfcd4d26e3d36e6d8d3bd59dfb0dd923d0f