Analysis
-
max time kernel
3s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 09:27
Behavioral task
behavioral1
Sample
4df392aaa1d685e96cdc2cfbd98b75eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4df392aaa1d685e96cdc2cfbd98b75eb.exe
Resource
win10v2004-20231215-en
General
-
Target
4df392aaa1d685e96cdc2cfbd98b75eb.exe
-
Size
3.9MB
-
MD5
4df392aaa1d685e96cdc2cfbd98b75eb
-
SHA1
4f5f91388dc11eac90e8d288b82ee51b007c41f6
-
SHA256
19679cbc4b7cd73fd4501ed735c351aaf8335f2adbf8a1d25965e87b683cd5bd
-
SHA512
b2f10bfc9597f4c4885496a1c8d9b6e0e826ee4c3461830601b45a7b595c9722edfd2436d101d10bb202bc2fd4e720422a903c8d631223b79d08c7c2dd6f16dd
-
SSDEEP
98304:2QXkDgpaCcakcibiqhGccFd3ucakcibiqh0V314pLG9cakcibiqhGccFd3ucakcO:2RgpxdlirRM5udlirqVl4g9dlirRM5u+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe -
Loads dropped DLL 1 IoCs
pid Process 2500 4df392aaa1d685e96cdc2cfbd98b75eb.exe -
resource yara_rule behavioral1/files/0x000d00000001224c-11.dat upx behavioral1/memory/1972-17-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000d00000001224c-15.dat upx behavioral1/memory/2500-0-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2500 4df392aaa1d685e96cdc2cfbd98b75eb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2500 4df392aaa1d685e96cdc2cfbd98b75eb.exe 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2500 wrote to memory of 1972 2500 4df392aaa1d685e96cdc2cfbd98b75eb.exe 20 PID 2500 wrote to memory of 1972 2500 4df392aaa1d685e96cdc2cfbd98b75eb.exe 20 PID 2500 wrote to memory of 1972 2500 4df392aaa1d685e96cdc2cfbd98b75eb.exe 20 PID 2500 wrote to memory of 1972 2500 4df392aaa1d685e96cdc2cfbd98b75eb.exe 20 PID 1972 wrote to memory of 2800 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 15 PID 1972 wrote to memory of 2800 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 15 PID 1972 wrote to memory of 2800 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 15 PID 1972 wrote to memory of 2800 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 15 PID 1972 wrote to memory of 2844 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 19 PID 1972 wrote to memory of 2844 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 19 PID 1972 wrote to memory of 2844 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 19 PID 1972 wrote to memory of 2844 1972 4df392aaa1d685e96cdc2cfbd98b75eb.exe 19 PID 2844 wrote to memory of 2944 2844 cmd.exe 17 PID 2844 wrote to memory of 2944 2844 cmd.exe 17 PID 2844 wrote to memory of 2944 2844 cmd.exe 17 PID 2844 wrote to memory of 2944 2844 cmd.exe 17
Processes
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4df392aaa1d685e96cdc2cfbd98b75eb.exe" /TN QxutJGth3fd4 /F1⤵
- Creates scheduled task(s)
PID:2800
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\RJxd1R9.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2844
-
C:\Users\Admin\AppData\Local\Temp\4df392aaa1d685e96cdc2cfbd98b75eb.exeC:\Users\Admin\AppData\Local\Temp\4df392aaa1d685e96cdc2cfbd98b75eb.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1972
-
C:\Users\Admin\AppData\Local\Temp\4df392aaa1d685e96cdc2cfbd98b75eb.exe"C:\Users\Admin\AppData\Local\Temp\4df392aaa1d685e96cdc2cfbd98b75eb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5fe08a98582cb98e8d8c6aa767af8b19d
SHA18f3a5925c906d7e7dfe7e0668e468a8874f4c8a9
SHA25641248c575d816f5b6ab3ea75418c89b1fa2fdb72b2bdd1f32e5f9bc056a4db81
SHA512c0fc66aa58c260b46e6c07d9e6bc68a63bb6a70096707d94dde4a77419f3773e841ee4b67ed7faf4234e2e46cb6cf7c7377511702d8bc519259033f83e704cda
-
Filesize
1KB
MD5bcc453382fb1d403e4040bec2c188f4e
SHA1215590b6f1493f09e5c02645a1e1ebb93c1688f6
SHA25697432b5dc15231454385d1d6f536e731ce4adea940022360564a9a71bbd9f4fa
SHA5128bb1f9fbd207ce0af897a3a10e1f75003fe7017274c8b351cef5b80815cf9bc8b37cb2fc4b98b4fe8a7c7e7cc93f85b5959eb3b77f016d8dc0bc087f9bff540b
-
Filesize
79KB
MD599c8e645a2140edc3c48ac2a8c5284a9
SHA164b4351e1d4eceee6a9e3cb40ec57ee9e5cdd359
SHA2567f82a301f9cfe5af70ebd95797263c7edcc0eddb0c931bfc1ac74b5e3bd17e2c
SHA5122f1a08953daa32c82abc615e16aeefb3b785429ddf6c9a710d592f114cf6c53e0182782a5fdf8c92d9e3c67e9f274ec87f6985ff8f7c15cdec2cda9238961728