Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:50
Behavioral task
behavioral1
Sample
36bd435927c1e7eab8a58e0d3a005d3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36bd435927c1e7eab8a58e0d3a005d3f.exe
Resource
win10v2004-20231222-en
General
-
Target
36bd435927c1e7eab8a58e0d3a005d3f.exe
-
Size
5.1MB
-
MD5
36bd435927c1e7eab8a58e0d3a005d3f
-
SHA1
0f956a54eb5e12b893d1b4c7b3c6e3428e95fc54
-
SHA256
d8f4dd6d2ec6e8df8b63683b6e965f6a54b77278140afa9a3950ef85787da747
-
SHA512
47949421d14c4c22983f05cda6767295bb6c2f7600ac06de227ef21d307e2c2b492a7fc995e898ebc810d3bcdf3aa74c1b746ed24fefd694eb4a988e00197891
-
SSDEEP
49152:t2U279QPvVBP9K0Nvg91NlU1DT5DvShX9HCbY7uay3TBqebDKNg9LKAS2a8Us9v5:typIVDVvINRtva36gpPV9g7xM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2368 36bd435927c1e7eab8a58e0d3a005d3f.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 36bd435927c1e7eab8a58e0d3a005d3f.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 36bd435927c1e7eab8a58e0d3a005d3f.exe -
resource yara_rule behavioral1/memory/3004-1-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x000b00000001224d-14.dat upx behavioral1/files/0x000b00000001224d-13.dat upx behavioral1/files/0x000b00000001224d-11.dat upx -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 36bd435927c1e7eab8a58e0d3a005d3f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 36bd435927c1e7eab8a58e0d3a005d3f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 36bd435927c1e7eab8a58e0d3a005d3f.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 36bd435927c1e7eab8a58e0d3a005d3f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3004 36bd435927c1e7eab8a58e0d3a005d3f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3004 36bd435927c1e7eab8a58e0d3a005d3f.exe 2368 36bd435927c1e7eab8a58e0d3a005d3f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2368 3004 36bd435927c1e7eab8a58e0d3a005d3f.exe 28 PID 3004 wrote to memory of 2368 3004 36bd435927c1e7eab8a58e0d3a005d3f.exe 28 PID 3004 wrote to memory of 2368 3004 36bd435927c1e7eab8a58e0d3a005d3f.exe 28 PID 3004 wrote to memory of 2368 3004 36bd435927c1e7eab8a58e0d3a005d3f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\36bd435927c1e7eab8a58e0d3a005d3f.exe"C:\Users\Admin\AppData\Local\Temp\36bd435927c1e7eab8a58e0d3a005d3f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\36bd435927c1e7eab8a58e0d3a005d3f.exeC:\Users\Admin\AppData\Local\Temp\36bd435927c1e7eab8a58e0d3a005d3f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719KB
MD563997516d0cbe0c58b37af908ab156af
SHA14020149c6302b95fafb010b09652c5201251446a
SHA256e4528a9d43f3157e5ff9d8906550cb101c731181e787b6695c34600ef54845b0
SHA512c81b36fc8744c8073b5519671ab07f8d1be53a5ecd253fab6714505134e9c74bd5944d2e29fd1cf6e8232f742ea15497c41aeaacd4377f3b424ef3a113922a87
-
Filesize
966KB
MD5e1a8be66caa8853934ca9bacf6c77bfb
SHA1de42ece5a657f81f122becf2959a3464dea117f1
SHA256fb62a9110c70e63f6acff8b5374092e38905d06d11f3579353bb7026668f2522
SHA512b10288d7f0bb057fb7e21c4e9b20073837a2eec761d1650d7ccf1475f7a5f63040ee72a064c136a0d5892f62bbd01a42fe1f6121c8211cd22306d1a003ee6bd0
-
Filesize
930KB
MD54dadd21e8f66c0b3ff4ff43d78f89edb
SHA1c7575875d5cec70461e04046f47bf90d104f4624
SHA25660de7fff96ac78b1450c5d82e71a57bb570595d604844a1aff8d9cf6fafdcb75
SHA5122b1a8dc0bd24afc83b6de81bf256b7ccaba60e907a9ca4c006e561872e4dd321b5250d90171c1f380920ef8c1ffebe8d950be0f6e61553cd49611b008f8915c8