Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
41ec9f4faf5bcedcc8fbb67bcadfe403.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41ec9f4faf5bcedcc8fbb67bcadfe403.exe
Resource
win10v2004-20231215-en
General
-
Target
41ec9f4faf5bcedcc8fbb67bcadfe403.exe
-
Size
385KB
-
MD5
41ec9f4faf5bcedcc8fbb67bcadfe403
-
SHA1
1445cb9c2ee4e36706a600d9fbf0073801f13794
-
SHA256
9610d49b3f1a5282bdad10e6158dd095121d93208e9472444c4baf277c33d379
-
SHA512
b4937dfba96d412812aedc039c6adab0af9db00f4bfa922f9e801281673ee8cc321f62c8fcf2fa4e8d3bfba7297a36eb44985064924eddf2420d535fd4947a79
-
SSDEEP
6144:zgY1g8B3htyjExeozuo3xO8yhxgL/KJFDA87aTFeTor+XN8Ff2aOLwLMB:zgYdMI4ohO8KxE/IVWZekrcNMZSwLMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 41ec9f4faf5bcedcc8fbb67bcadfe403.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 41ec9f4faf5bcedcc8fbb67bcadfe403.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 41ec9f4faf5bcedcc8fbb67bcadfe403.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 41ec9f4faf5bcedcc8fbb67bcadfe403.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 41ec9f4faf5bcedcc8fbb67bcadfe403.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 41ec9f4faf5bcedcc8fbb67bcadfe403.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 41ec9f4faf5bcedcc8fbb67bcadfe403.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1704 41ec9f4faf5bcedcc8fbb67bcadfe403.exe 2732 41ec9f4faf5bcedcc8fbb67bcadfe403.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2732 1704 41ec9f4faf5bcedcc8fbb67bcadfe403.exe 28 PID 1704 wrote to memory of 2732 1704 41ec9f4faf5bcedcc8fbb67bcadfe403.exe 28 PID 1704 wrote to memory of 2732 1704 41ec9f4faf5bcedcc8fbb67bcadfe403.exe 28 PID 1704 wrote to memory of 2732 1704 41ec9f4faf5bcedcc8fbb67bcadfe403.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ec9f4faf5bcedcc8fbb67bcadfe403.exe"C:\Users\Admin\AppData\Local\Temp\41ec9f4faf5bcedcc8fbb67bcadfe403.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\41ec9f4faf5bcedcc8fbb67bcadfe403.exeC:\Users\Admin\AppData\Local\Temp\41ec9f4faf5bcedcc8fbb67bcadfe403.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD543cb59844999109749ca9dda5878d831
SHA17094eacce909d157c44b146a2a405f85708d65de
SHA2566319e941c939767d4f40e71824b2bd06b375b2630be113b74c013d4c17aa51e7
SHA5128a1dbe1f6120a25aca9e7036e553b9d165c2550293afdcdc8546b7991ee10ad398504182f262219ae1465b935f4a6b06d0898ee779ec145d1764015fc562129a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
62KB
MD50624b68d4c73fee29236d8d8ef148d50
SHA1cbbe4131719112688e08e0917147075bf7965161
SHA25623f876876c402c23b0ffba7613e4ae159dfb9f436eadd5a48169d3c9d0b70167
SHA5129f3599cfd9ec92a1cbb493b8fe2fac04ef3358e3ad4ecbcae5f2d809ec3336558966b8e36cb9b62d3de54e5dd1d4f969f60a53faf8b8926136266f6d802836d3