Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 03:52
Behavioral task
behavioral1
Sample
42af64380ee1e860610ec1e1d1510acf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
42af64380ee1e860610ec1e1d1510acf.exe
Resource
win10v2004-20231215-en
General
-
Target
42af64380ee1e860610ec1e1d1510acf.exe
-
Size
1003KB
-
MD5
42af64380ee1e860610ec1e1d1510acf
-
SHA1
61e9ada2e241320db67025748afea988ab53db13
-
SHA256
4b0585b2bf1632faef5dc0215f290870fd99ffcfeb474bb9ffbf3b27f84c9d39
-
SHA512
f43d69ec74ba963efc450af9c6964b7665fa78e43cbdf39672fe1f101857773e7a2587c022ea052135b2ed84713b296f9344984fb1a8c77ca9d594060c2bc4ab
-
SSDEEP
24576:3l5lo3ILp2LpT3KGQoadai7D3uITjIFOxo53ApIj:3l/NwpT3KGQ7ai7D3xTgOxYwpK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 42af64380ee1e860610ec1e1d1510acf.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 42af64380ee1e860610ec1e1d1510acf.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 42af64380ee1e860610ec1e1d1510acf.exe -
resource yara_rule behavioral1/memory/2024-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000015cfa-15.dat upx behavioral1/files/0x000b000000015cfa-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 42af64380ee1e860610ec1e1d1510acf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 42af64380ee1e860610ec1e1d1510acf.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 42af64380ee1e860610ec1e1d1510acf.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 42af64380ee1e860610ec1e1d1510acf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 42af64380ee1e860610ec1e1d1510acf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2024 42af64380ee1e860610ec1e1d1510acf.exe 1704 42af64380ee1e860610ec1e1d1510acf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1704 2024 42af64380ee1e860610ec1e1d1510acf.exe 34 PID 2024 wrote to memory of 1704 2024 42af64380ee1e860610ec1e1d1510acf.exe 34 PID 2024 wrote to memory of 1704 2024 42af64380ee1e860610ec1e1d1510acf.exe 34 PID 2024 wrote to memory of 1704 2024 42af64380ee1e860610ec1e1d1510acf.exe 34 PID 1704 wrote to memory of 2644 1704 42af64380ee1e860610ec1e1d1510acf.exe 30 PID 1704 wrote to memory of 2644 1704 42af64380ee1e860610ec1e1d1510acf.exe 30 PID 1704 wrote to memory of 2644 1704 42af64380ee1e860610ec1e1d1510acf.exe 30 PID 1704 wrote to memory of 2644 1704 42af64380ee1e860610ec1e1d1510acf.exe 30 PID 1704 wrote to memory of 2692 1704 42af64380ee1e860610ec1e1d1510acf.exe 33 PID 1704 wrote to memory of 2692 1704 42af64380ee1e860610ec1e1d1510acf.exe 33 PID 1704 wrote to memory of 2692 1704 42af64380ee1e860610ec1e1d1510acf.exe 33 PID 1704 wrote to memory of 2692 1704 42af64380ee1e860610ec1e1d1510acf.exe 33 PID 2692 wrote to memory of 2568 2692 cmd.exe 32 PID 2692 wrote to memory of 2568 2692 cmd.exe 32 PID 2692 wrote to memory of 2568 2692 cmd.exe 32 PID 2692 wrote to memory of 2568 2692 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\42af64380ee1e860610ec1e1d1510acf.exe"C:\Users\Admin\AppData\Local\Temp\42af64380ee1e860610ec1e1d1510acf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\42af64380ee1e860610ec1e1d1510acf.exeC:\Users\Admin\AppData\Local\Temp\42af64380ee1e860610ec1e1d1510acf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\42af64380ee1e860610ec1e1d1510acf.exe" /TN qm2lmOfce5f6 /F1⤵
- Creates scheduled task(s)
PID:2644
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\yC2Ir.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD505dfea4e2db2d3a8435895e75f2a5ca0
SHA1d29f1312c7f4b35ed631f858029f8a925ef0e4d6
SHA2561fa9b96d164431958f183057dc2c597a028ac26adc14d095944d2744e92e8b4c
SHA51271970f651779c6f9ffcb4d72bf0b9478023f2d6d02b871c518f16ccafbcff11db7000e7fa03760d3474f3f45bbbb45e6d3c4dab4f2b542b4a1b7c3b3e13807eb
-
Filesize
1KB
MD5e49e7f8251882dee16d04432f7a1de7d
SHA1e1c639a4f3e7fdcea7a5058771bfde37175f2e4b
SHA2561f859d6d5b028b8d9531b5bd2677b13fe9e47b0394aa3611a3af60651f303fe6
SHA5121da791efc914131ee6d7cc093073db6629d1f91361c0119cba7f6351958e05f8d395de65e35c60249ce5706e1d4b7fefdc8fb4fbd6ed16cc422b78f65272a582
-
Filesize
804KB
MD55de5312b2bc67e11611cd8e24929f1c7
SHA15a7adcb0131029eb2e88d4dcc2811d80ba7496cf
SHA25665749e0d6084839f0986970d02a5e7cadf1584d30ac096e4665e62532e49838a
SHA5125f53c8db4d9c14e168477d8774894bf7a8bdee94b1d69561b441b24acda9ff99258a69ce639854d62fccdc981a2281749fd0e8c28deb6a456116a534bb6fa3d0