Analysis
-
max time kernel
118s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 23:06
Behavioral task
behavioral1
Sample
3f43121883e5be50ef9beb63bfe6931b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f43121883e5be50ef9beb63bfe6931b.exe
Resource
win10v2004-20231215-en
General
-
Target
3f43121883e5be50ef9beb63bfe6931b.exe
-
Size
3.2MB
-
MD5
3f43121883e5be50ef9beb63bfe6931b
-
SHA1
42150c4e55748ff8d754d51b7a4d1d578f03f9e3
-
SHA256
871a6fc581cff72fd8a1286dfc725f684ee0f869160f4e2a9ec6c64267353450
-
SHA512
9c691b1aa5e67cc78dfc9f6fc89cda4b84b7aa2a71fb0c187ce78e64fc3582c418c695459658406ec4328a01541a32ed5515bb56776206d2f36c4118b85b56f2
-
SSDEEP
98304:5whFexVcakchS87ccakc5J1at2QucakchS87ccakcO:UGVdlhS87cdl5JskTdlhS87cdlO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2156 3f43121883e5be50ef9beb63bfe6931b.exe -
Executes dropped EXE 1 IoCs
pid Process 2156 3f43121883e5be50ef9beb63bfe6931b.exe -
Loads dropped DLL 1 IoCs
pid Process 2068 3f43121883e5be50ef9beb63bfe6931b.exe -
resource yara_rule behavioral1/memory/2068-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001224a-11.dat upx behavioral1/memory/2068-16-0x0000000023430000-0x000000002368C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 3f43121883e5be50ef9beb63bfe6931b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 3f43121883e5be50ef9beb63bfe6931b.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 3f43121883e5be50ef9beb63bfe6931b.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 3f43121883e5be50ef9beb63bfe6931b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2068 3f43121883e5be50ef9beb63bfe6931b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2068 3f43121883e5be50ef9beb63bfe6931b.exe 2156 3f43121883e5be50ef9beb63bfe6931b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2156 2068 3f43121883e5be50ef9beb63bfe6931b.exe 29 PID 2068 wrote to memory of 2156 2068 3f43121883e5be50ef9beb63bfe6931b.exe 29 PID 2068 wrote to memory of 2156 2068 3f43121883e5be50ef9beb63bfe6931b.exe 29 PID 2068 wrote to memory of 2156 2068 3f43121883e5be50ef9beb63bfe6931b.exe 29 PID 2156 wrote to memory of 2608 2156 3f43121883e5be50ef9beb63bfe6931b.exe 30 PID 2156 wrote to memory of 2608 2156 3f43121883e5be50ef9beb63bfe6931b.exe 30 PID 2156 wrote to memory of 2608 2156 3f43121883e5be50ef9beb63bfe6931b.exe 30 PID 2156 wrote to memory of 2608 2156 3f43121883e5be50ef9beb63bfe6931b.exe 30 PID 2156 wrote to memory of 1748 2156 3f43121883e5be50ef9beb63bfe6931b.exe 32 PID 2156 wrote to memory of 1748 2156 3f43121883e5be50ef9beb63bfe6931b.exe 32 PID 2156 wrote to memory of 1748 2156 3f43121883e5be50ef9beb63bfe6931b.exe 32 PID 2156 wrote to memory of 1748 2156 3f43121883e5be50ef9beb63bfe6931b.exe 32 PID 1748 wrote to memory of 2628 1748 cmd.exe 34 PID 1748 wrote to memory of 2628 1748 cmd.exe 34 PID 1748 wrote to memory of 2628 1748 cmd.exe 34 PID 1748 wrote to memory of 2628 1748 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f43121883e5be50ef9beb63bfe6931b.exe"C:\Users\Admin\AppData\Local\Temp\3f43121883e5be50ef9beb63bfe6931b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\3f43121883e5be50ef9beb63bfe6931b.exeC:\Users\Admin\AppData\Local\Temp\3f43121883e5be50ef9beb63bfe6931b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\3f43121883e5be50ef9beb63bfe6931b.exe" /TN WAgLRKqP8c0d /F3⤵
- Creates scheduled task(s)
PID:2608
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN WAgLRKqP8c0d > C:\Users\Admin\AppData\Local\Temp\DH5VGMyEp.xml3⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN WAgLRKqP8c0d4⤵PID:2628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD596aa60045c7c184c6ce3a73bd387e1c3
SHA123a8361e783f6e75ec85f305bd9392f3b5ee5c8f
SHA256f4f68f5be8665f72ecd08427aceb0886130717e0ac09df35368e3262e537eb22
SHA5126f8d6635a1fca976bd41ad46de92ccf689461f7b2ce7bce1e87a20e4b7a1e8c502e5b06f15a15a03e63989152132f0ad7915bb2a7e0203a508b012f61ae4e56e
-
Filesize
3.2MB
MD5b1d4f3365c227132a686a43cf6dcd5fd
SHA1d82c12fac412dbab1705f03701d4baed65ef5e54
SHA2565722b4496ba75ae3219adb56907f05cfd2aadba797dde5f281d1a6f1ec2e7062
SHA512ca915afd2301d700fca6a78aef323f8c4b4673c47715c185e6de5d719ca790c353df945eb5f517cd31848e1761e450fc4308eb8587f8c3a23635bcb0afdf5d30