Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 05:15
Behavioral task
behavioral1
Sample
4d6dcd98d592779b427d6ad240be6987.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4d6dcd98d592779b427d6ad240be6987.exe
Resource
win10v2004-20231215-en
General
-
Target
4d6dcd98d592779b427d6ad240be6987.exe
-
Size
4.0MB
-
MD5
4d6dcd98d592779b427d6ad240be6987
-
SHA1
8ac081d0cf065d5b5bf6e2623b13ae196b29b6c4
-
SHA256
1b6d270333c03c7b6a9b807f64dd559f2a81975257269176e128878a0c7a3676
-
SHA512
422d032d1abfb33fc688326676d1a85399cd7639ca0de9f7b6863b45a140ff2773faac44c20e5475ea656f62c808ef3f1051f3b31e829c30756b67a62710e31b
-
SSDEEP
98304:Zgr4ZO3dxAVcakH4fInW6McakpXgNzcwOEmB6Zv77jFcakH4fInW6McakpXgNzcB:ZgM8Nxsdpwn1MdywRcS06F7jFdpwn1Mc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1936 4d6dcd98d592779b427d6ad240be6987.exe -
Executes dropped EXE 1 IoCs
pid Process 1936 4d6dcd98d592779b427d6ad240be6987.exe -
Loads dropped DLL 1 IoCs
pid Process 2888 4d6dcd98d592779b427d6ad240be6987.exe -
resource yara_rule behavioral1/memory/2888-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000013a1a-11.dat upx behavioral1/files/0x000a000000013a1a-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 4d6dcd98d592779b427d6ad240be6987.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 4d6dcd98d592779b427d6ad240be6987.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 4d6dcd98d592779b427d6ad240be6987.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 4d6dcd98d592779b427d6ad240be6987.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2888 4d6dcd98d592779b427d6ad240be6987.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2888 4d6dcd98d592779b427d6ad240be6987.exe 1936 4d6dcd98d592779b427d6ad240be6987.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1936 2888 4d6dcd98d592779b427d6ad240be6987.exe 29 PID 2888 wrote to memory of 1936 2888 4d6dcd98d592779b427d6ad240be6987.exe 29 PID 2888 wrote to memory of 1936 2888 4d6dcd98d592779b427d6ad240be6987.exe 29 PID 2888 wrote to memory of 1936 2888 4d6dcd98d592779b427d6ad240be6987.exe 29 PID 1936 wrote to memory of 2552 1936 4d6dcd98d592779b427d6ad240be6987.exe 30 PID 1936 wrote to memory of 2552 1936 4d6dcd98d592779b427d6ad240be6987.exe 30 PID 1936 wrote to memory of 2552 1936 4d6dcd98d592779b427d6ad240be6987.exe 30 PID 1936 wrote to memory of 2552 1936 4d6dcd98d592779b427d6ad240be6987.exe 30 PID 1936 wrote to memory of 2608 1936 4d6dcd98d592779b427d6ad240be6987.exe 34 PID 1936 wrote to memory of 2608 1936 4d6dcd98d592779b427d6ad240be6987.exe 34 PID 1936 wrote to memory of 2608 1936 4d6dcd98d592779b427d6ad240be6987.exe 34 PID 1936 wrote to memory of 2608 1936 4d6dcd98d592779b427d6ad240be6987.exe 34 PID 2608 wrote to memory of 2668 2608 cmd.exe 32 PID 2608 wrote to memory of 2668 2608 cmd.exe 32 PID 2608 wrote to memory of 2668 2608 cmd.exe 32 PID 2608 wrote to memory of 2668 2608 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d6dcd98d592779b427d6ad240be6987.exe"C:\Users\Admin\AppData\Local\Temp\4d6dcd98d592779b427d6ad240be6987.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\4d6dcd98d592779b427d6ad240be6987.exeC:\Users\Admin\AppData\Local\Temp\4d6dcd98d592779b427d6ad240be6987.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4d6dcd98d592779b427d6ad240be6987.exe" /TN qm2lmOfce5f6 /F3⤵
- Creates scheduled task(s)
PID:2552
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\AyyVea.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2608
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
813KB
MD59485258e9c0dfb24f8dc5b40905529e6
SHA1102fccbd87a22f524d942e377f5a96eb3303b03f
SHA2561c8e2b91a2d5a48ab51f41874d11a174dd1e155727181dc549ad042b39e53174
SHA512d0f43d78e9f47e1c407a30ef6b86a438ed19dbd70d9c7d35da887eaa7768dc63e369410c866c96717f65481c233ca2c4f493d1cb34a10a0c36e915fca79e8713
-
Filesize
1KB
MD55c82a3d4609f15801355e108bcfdec9f
SHA1a420a6b305a270d50d9a54b96cdb23ffb85970cd
SHA256296592b9015ad8a13b5a0cd78d7de9c8eeac54d2ba1c0de1cd6213047bd97b53
SHA5120b9782f77c3decbf8212fa82931b496ab926a1ee599bcb9180aa6c5e5d556026fd9ab6f1c6ec66f724aca0256f1358342c4043a52c8054eade658bb2bfd6a210
-
Filesize
763KB
MD5afa5af579fbd90fe458a2603d4d81096
SHA1e3f48c701a8bfabb4deb667e339a46137ecced32
SHA256c2f25e94f0b154707c20ba9bde843849f11a35742f9ec688ed6f305455d56779
SHA512664ff1ec03d5c0f39b6704ca552208b2d8ef6f70e05c5d6f8d671e45d6e20cd3c0d10cd66a421ca7bf63bcb5ce96537a234f9943023fd42b919a0716ed6d0a54