Analysis
-
max time kernel
4s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:31
Behavioral task
behavioral1
Sample
42e17026c8e49f331c5d92fb85e7ae7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42e17026c8e49f331c5d92fb85e7ae7f.exe
Resource
win10v2004-20231215-en
General
-
Target
42e17026c8e49f331c5d92fb85e7ae7f.exe
-
Size
133KB
-
MD5
42e17026c8e49f331c5d92fb85e7ae7f
-
SHA1
cfcdaefa2eeab41316cafeef7bd442289772433f
-
SHA256
2e5d32c129dc3e88112504034808fa84cc164695294923750176883675479eb9
-
SHA512
a0a1770913c1048f8adf5b80a5d0d2cdddc26b292b15310f8bd8d64eadc0cc38dab9bb1db4f226f716b2d830b95f4885082b27392102e7ed1e45bd91252c1c06
-
SSDEEP
3072:NmHGhPaqnq69vH7mDlsEEbzRDVMRI7QcEPEjsN5mJ25YQ:Vhaqn/vH7m3oRDaI7h9o5mJjQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2856 42e17026c8e49f331c5d92fb85e7ae7f.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 42e17026c8e49f331c5d92fb85e7ae7f.exe -
Loads dropped DLL 1 IoCs
pid Process 1656 42e17026c8e49f331c5d92fb85e7ae7f.exe -
resource yara_rule behavioral1/memory/1656-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/files/0x0009000000012266-11.dat upx behavioral1/files/0x0009000000012266-16.dat upx -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 42e17026c8e49f331c5d92fb85e7ae7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 42e17026c8e49f331c5d92fb85e7ae7f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1656 42e17026c8e49f331c5d92fb85e7ae7f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1656 42e17026c8e49f331c5d92fb85e7ae7f.exe 2856 42e17026c8e49f331c5d92fb85e7ae7f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2856 1656 42e17026c8e49f331c5d92fb85e7ae7f.exe 16 PID 1656 wrote to memory of 2856 1656 42e17026c8e49f331c5d92fb85e7ae7f.exe 16 PID 1656 wrote to memory of 2856 1656 42e17026c8e49f331c5d92fb85e7ae7f.exe 16 PID 1656 wrote to memory of 2856 1656 42e17026c8e49f331c5d92fb85e7ae7f.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e17026c8e49f331c5d92fb85e7ae7f.exe"C:\Users\Admin\AppData\Local\Temp\42e17026c8e49f331c5d92fb85e7ae7f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\42e17026c8e49f331c5d92fb85e7ae7f.exeC:\Users\Admin\AppData\Local\Temp\42e17026c8e49f331c5d92fb85e7ae7f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5790c6e2849dee30ba97fad16a5c792dc
SHA130ed08a66ac6da5637ccda372e375fae79ed83ce
SHA25674ef1021a6aef0568fbc223c37a239aa99ba16f252fa733ea8bd197ad2a96d41
SHA51212bcbfc593350e7f1d2b2f0a208481800d60d35c9bc964e50616380e8cdf0b7ec21f5589f661e4dac598f3bc9db2ad9aa1e0c77e046080f6e1dbae12eec57698
-
Filesize
61KB
MD5a1d800b742dfa2440fa27fb17c22c321
SHA11873379abe9208c988f8237e377f8420c69cde54
SHA2562e614d1f55512aaaaa158987fcf95ec381e91068d9d29d12c6c5a3586ad241f4
SHA5125bbf483ce5926cf5920f0bacfcf1662e5910465637c32138da230b3383b5c23b2bc17cb6cddaf2f57d56dfceab457e0b72542bc030e79128c66590d9a6e335b3