Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
38c54783d3eae2b66b7e0c44eb8285ff.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
38c54783d3eae2b66b7e0c44eb8285ff.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
38c54783d3eae2b66b7e0c44eb8285ff.exe
-
Size
385KB
-
MD5
38c54783d3eae2b66b7e0c44eb8285ff
-
SHA1
6d50e283a610bd33bc2b12c999ebca312991e062
-
SHA256
034de4202eda6f2a8286db3923ce7083b04ae7feda8dee159553bf148ee18f78
-
SHA512
1b6f9e2886682c22a95211e43e1727aecd74a86ff28e4ac4289a57a811acd4992547236973eb98a1a57e86891baf26a9ebbc1815a3856625a201c4ae8295f384
-
SSDEEP
6144:6mp/LsPld2pqVMmG5oKnkQCseFCWPMxnFFX0aHrSTXAcDIZS0eyXBB://LIlkUVM9/k+5p0EIXpDIZSxyXBB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4444 38c54783d3eae2b66b7e0c44eb8285ff.exe -
Executes dropped EXE 1 IoCs
pid Process 4444 38c54783d3eae2b66b7e0c44eb8285ff.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 38c54783d3eae2b66b7e0c44eb8285ff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 38c54783d3eae2b66b7e0c44eb8285ff.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4320 38c54783d3eae2b66b7e0c44eb8285ff.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4320 38c54783d3eae2b66b7e0c44eb8285ff.exe 4444 38c54783d3eae2b66b7e0c44eb8285ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4320 wrote to memory of 4444 4320 38c54783d3eae2b66b7e0c44eb8285ff.exe 16 PID 4320 wrote to memory of 4444 4320 38c54783d3eae2b66b7e0c44eb8285ff.exe 16 PID 4320 wrote to memory of 4444 4320 38c54783d3eae2b66b7e0c44eb8285ff.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\38c54783d3eae2b66b7e0c44eb8285ff.exe"C:\Users\Admin\AppData\Local\Temp\38c54783d3eae2b66b7e0c44eb8285ff.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\38c54783d3eae2b66b7e0c44eb8285ff.exeC:\Users\Admin\AppData\Local\Temp\38c54783d3eae2b66b7e0c44eb8285ff.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:4444
-