Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 21:48
Behavioral task
behavioral1
Sample
49db2c09312a11cbe621480bbfa6f3fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49db2c09312a11cbe621480bbfa6f3fa.exe
Resource
win10v2004-20231222-en
General
-
Target
49db2c09312a11cbe621480bbfa6f3fa.exe
-
Size
5.5MB
-
MD5
49db2c09312a11cbe621480bbfa6f3fa
-
SHA1
66186d46b620032ec169b610dfe51eb4d083fc9b
-
SHA256
208405085ab3c867e54979bd6097029123af9959052444d5a5589f682c92df29
-
SHA512
c9a256b12d2085d29f12f4d66f84d1dcb1dc9a827515ec7bd6099fc345d93837c384cbfa59328ff2b9015a7de912cc76b012cc10d1f2afeecaffc6dd96321f73
-
SSDEEP
49152:ho9oAb6moev0jG+O9DYEchWcn6MKXQv4bXovod6VXay3vRmCFOGNj8mW4JH53R+N:KTvt3cHeA/35mCckFR+vicS43
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2260 49db2c09312a11cbe621480bbfa6f3fa.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 49db2c09312a11cbe621480bbfa6f3fa.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 49db2c09312a11cbe621480bbfa6f3fa.exe -
resource yara_rule behavioral1/memory/2488-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x000a000000012256-13.dat upx behavioral1/files/0x000a000000012256-14.dat upx behavioral1/files/0x000a000000012256-11.dat upx -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 49db2c09312a11cbe621480bbfa6f3fa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 49db2c09312a11cbe621480bbfa6f3fa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 49db2c09312a11cbe621480bbfa6f3fa.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 49db2c09312a11cbe621480bbfa6f3fa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2488 49db2c09312a11cbe621480bbfa6f3fa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2488 49db2c09312a11cbe621480bbfa6f3fa.exe 2260 49db2c09312a11cbe621480bbfa6f3fa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2260 2488 49db2c09312a11cbe621480bbfa6f3fa.exe 28 PID 2488 wrote to memory of 2260 2488 49db2c09312a11cbe621480bbfa6f3fa.exe 28 PID 2488 wrote to memory of 2260 2488 49db2c09312a11cbe621480bbfa6f3fa.exe 28 PID 2488 wrote to memory of 2260 2488 49db2c09312a11cbe621480bbfa6f3fa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\49db2c09312a11cbe621480bbfa6f3fa.exe"C:\Users\Admin\AppData\Local\Temp\49db2c09312a11cbe621480bbfa6f3fa.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\49db2c09312a11cbe621480bbfa6f3fa.exeC:\Users\Admin\AppData\Local\Temp\49db2c09312a11cbe621480bbfa6f3fa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5ef78a1a03d211f84be037c587b59c466
SHA1ce591004d479dbd0b5988ab9f99d0cbfaf673e45
SHA256ae4318af9cf71bf747ce9a38785d93d493f5b1157ebf15d69c04fe6bae845604
SHA5129755542ea0b22a26a4a19560a7f9f25a6bf795446b275f9a47226b1b817a105e368917b4e60acd2918022d11e394bbf8c5f40a8327272b3d1aa4de4c1b8e1e93
-
Filesize
320KB
MD5055ca652919cb2a05a70758e7d89a788
SHA1297c62108ea22dfd3c8959e6d40eb600414f1490
SHA256531a786fc7b80e855b2e9b5b53e199c32e1968582898da6a062e5cd3d77d93ba
SHA512536d213000e9b2d3c5903c88636e4f178a00edd0578cc0e62e32a6b5472c43c422a1d7058a5b9053d7e9c27f48a6aa16b82a6c897489177c28c2a276e75d9ccb
-
Filesize
576KB
MD54428b527d153b090074676a86d4cdece
SHA10b85d7568cc49b11a321392415c4dca84789d2b2
SHA256ad18ef63c3c690e49b1d9f933dfc18bb4f4d4dd4a07c2c0ddde5219535f5abad
SHA512a3f6218af7360998d6e674ed2863b97188a9e3f31e7b920f2c919baf390e6022a5ff5e90e308c64b5b91db2e9c589a9affeb36e252572667e1f318b699e46a56