Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 21:20
Behavioral task
behavioral1
Sample
3edc7f9502da7acf6117c20e06f93ebf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3edc7f9502da7acf6117c20e06f93ebf.exe
Resource
win10v2004-20231215-en
General
-
Target
3edc7f9502da7acf6117c20e06f93ebf.exe
-
Size
501KB
-
MD5
3edc7f9502da7acf6117c20e06f93ebf
-
SHA1
49c78ad7743646d7b91a44d8a55dc4bfa90907c1
-
SHA256
279d90c3cf37ee618fda13d1072b407e7e7d2c9ef5e7095221ece36994ccd42c
-
SHA512
2e7b7a4e904b4e588a63aca927ece006108e29bf4266dd14e5e0380ae191f70950d36f735aec62612ca5e705a15c9e42e8188a207a7e5dbca95fc93649a6c35b
-
SSDEEP
12288:A7HGnOUrvfBbKwcYTG4ha8NkFqzQ8U6iQCbXp6PAo6:A7HGn7fBrc0pYlqztUlQCMY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 3edc7f9502da7acf6117c20e06f93ebf.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 3edc7f9502da7acf6117c20e06f93ebf.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 3edc7f9502da7acf6117c20e06f93ebf.exe -
resource yara_rule behavioral1/memory/2392-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012247-17.dat upx behavioral1/memory/2392-16-0x0000000022D90000-0x0000000022FEC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2332 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 3edc7f9502da7acf6117c20e06f93ebf.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 3edc7f9502da7acf6117c20e06f93ebf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 3edc7f9502da7acf6117c20e06f93ebf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 3edc7f9502da7acf6117c20e06f93ebf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 3edc7f9502da7acf6117c20e06f93ebf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2392 3edc7f9502da7acf6117c20e06f93ebf.exe 2720 3edc7f9502da7acf6117c20e06f93ebf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2720 2392 3edc7f9502da7acf6117c20e06f93ebf.exe 29 PID 2392 wrote to memory of 2720 2392 3edc7f9502da7acf6117c20e06f93ebf.exe 29 PID 2392 wrote to memory of 2720 2392 3edc7f9502da7acf6117c20e06f93ebf.exe 29 PID 2392 wrote to memory of 2720 2392 3edc7f9502da7acf6117c20e06f93ebf.exe 29 PID 2720 wrote to memory of 2332 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 30 PID 2720 wrote to memory of 2332 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 30 PID 2720 wrote to memory of 2332 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 30 PID 2720 wrote to memory of 2332 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 30 PID 2720 wrote to memory of 2612 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 32 PID 2720 wrote to memory of 2612 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 32 PID 2720 wrote to memory of 2612 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 32 PID 2720 wrote to memory of 2612 2720 3edc7f9502da7acf6117c20e06f93ebf.exe 32 PID 2612 wrote to memory of 2768 2612 cmd.exe 34 PID 2612 wrote to memory of 2768 2612 cmd.exe 34 PID 2612 wrote to memory of 2768 2612 cmd.exe 34 PID 2612 wrote to memory of 2768 2612 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3edc7f9502da7acf6117c20e06f93ebf.exe"C:\Users\Admin\AppData\Local\Temp\3edc7f9502da7acf6117c20e06f93ebf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\3edc7f9502da7acf6117c20e06f93ebf.exeC:\Users\Admin\AppData\Local\Temp\3edc7f9502da7acf6117c20e06f93ebf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\3edc7f9502da7acf6117c20e06f93ebf.exe" /TN uhTCmbCqd877 /F3⤵
- Creates scheduled task(s)
PID:2332
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\qxOQYp2.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uhTCmbCqd8774⤵PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5f9878472d55d78630a4919d189e15c95
SHA1051b7be3b6eaf75992ea02363d7213491e01212a
SHA2567b1b21d3c17d0777152da993ac53064b7685fd1743b2b58231421ef710c4f203
SHA5122523bd1d5bfe530b31d6f360211f6e313fe1edf4b3e2a104d92b350a0cb08acde10269b31c5eb43e08e2957ae123d38f69e8bd4276ae930b0719fcd0cef8453a
-
Filesize
1KB
MD51cb753e6e9d5392e4ee4bf9c02c1ccea
SHA1632f55c9daade6134d4266771fdc59a9a30b5dac
SHA256e8251ced90429c3a6be4c2dbfc04393adf99caa1c9b91976893ecd95b26fc9df
SHA5123bed80ad6d493b234ae1672210784bfa37ad0d6fcdbd4113b4a8727a7a950d10e15849877d065e08b9f2803baeb8aeee8d043c23b848d7314c4ef458d5b6e54d