Analysis
-
max time kernel
2s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 14:06
Behavioral task
behavioral1
Sample
43e17b320afaaee4f68d80dc2bb0d393.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43e17b320afaaee4f68d80dc2bb0d393.exe
Resource
win10v2004-20231215-en
General
-
Target
43e17b320afaaee4f68d80dc2bb0d393.exe
-
Size
133KB
-
MD5
43e17b320afaaee4f68d80dc2bb0d393
-
SHA1
a12518a7d7325ec707f270131c10b9d7092c4ee3
-
SHA256
8cb4ea74a20657f3ac9614fd764eaaa4088332421e385c351870b81bc3e6edb7
-
SHA512
f1ac787b5f92dd656dfbbb89e6845ddb62a842f4a9daf3bc0337b4a51b01b0d81761deaa5131c7d1476b763ef106e9d2ee8ffabc3316035e42f61b82ad2080b0
-
SSDEEP
3072:T48xOYMXCjB7f91/ObboAIlky7rX1jPjJdhSerzrh+WX7eN1+D80FrQ:T48PJHGXfIay7b1jldh1rzrsWLWl05Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1904 43e17b320afaaee4f68d80dc2bb0d393.exe -
Executes dropped EXE 1 IoCs
pid Process 1904 43e17b320afaaee4f68d80dc2bb0d393.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 43e17b320afaaee4f68d80dc2bb0d393.exe -
resource yara_rule behavioral1/memory/2248-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/files/0x000d000000012246-15.dat upx behavioral1/files/0x000d000000012246-10.dat upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 43e17b320afaaee4f68d80dc2bb0d393.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 43e17b320afaaee4f68d80dc2bb0d393.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2248 43e17b320afaaee4f68d80dc2bb0d393.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2248 43e17b320afaaee4f68d80dc2bb0d393.exe 1904 43e17b320afaaee4f68d80dc2bb0d393.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1904 2248 43e17b320afaaee4f68d80dc2bb0d393.exe 17 PID 2248 wrote to memory of 1904 2248 43e17b320afaaee4f68d80dc2bb0d393.exe 17 PID 2248 wrote to memory of 1904 2248 43e17b320afaaee4f68d80dc2bb0d393.exe 17 PID 2248 wrote to memory of 1904 2248 43e17b320afaaee4f68d80dc2bb0d393.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\43e17b320afaaee4f68d80dc2bb0d393.exe"C:\Users\Admin\AppData\Local\Temp\43e17b320afaaee4f68d80dc2bb0d393.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\43e17b320afaaee4f68d80dc2bb0d393.exeC:\Users\Admin\AppData\Local\Temp\43e17b320afaaee4f68d80dc2bb0d393.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD58f051e9a4fe9bfcb28adbee9fafbec3d
SHA13de358c78ff6eb2892cac6a814091db6af4b0a70
SHA2562edf91232990d9ca661f0a6bd8022a18c0369f493885345b671ef8d69e34a390
SHA512d1376159084756dc608e6e36bb1a1e268edc97091c4f0e82a71545928aba7d72cd8bdd544c51a1221b363134a53743ccb0b2e5b4869907366f1a47f2a7d8674b
-
Filesize
75KB
MD554274460fd4fac88c5af62d492a82a37
SHA1ed3519afd682febc96e000bc9a8f7e8c439d8dbd
SHA2563791e9644804c574b9efd46b28a0dd04dd141467980c225d2c2265848f792d00
SHA512425db347a4e6a4d36d4c1feec6809c628340ae4cdfba7dc5a955438e0c59bc88aa9036ebaaae15a7da4b17fb4fc5c68abd26691f7a48f5c992990db4b38ab247