Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
50be72cb1e50c5ad47204d6ce29cb80d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50be72cb1e50c5ad47204d6ce29cb80d.exe
Resource
win10v2004-20231215-en
General
-
Target
50be72cb1e50c5ad47204d6ce29cb80d.exe
-
Size
385KB
-
MD5
50be72cb1e50c5ad47204d6ce29cb80d
-
SHA1
8a6ef27a803ca4d1e38124daf1f0abc7fe9a1fc2
-
SHA256
208fea7f3e9f7c7f19e906a74429ab025851e21b22444650316503ec197612d2
-
SHA512
05aa3872611f1f1273b07a114df35598a87827afe890e68a3b4006f3bb8fe0f95c76fadf2ebbfc8d6cf1d78d5db20e459454dcbcfb7ef031619e2ae1d50c73cb
-
SSDEEP
12288:kaK1XwOW6LOvATybWIkpmlmiAD+03+Ys/FjMB:e1AOW6LOoTuWMmie+YUjMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2620 50be72cb1e50c5ad47204d6ce29cb80d.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 50be72cb1e50c5ad47204d6ce29cb80d.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 50be72cb1e50c5ad47204d6ce29cb80d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 50be72cb1e50c5ad47204d6ce29cb80d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 50be72cb1e50c5ad47204d6ce29cb80d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 50be72cb1e50c5ad47204d6ce29cb80d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2720 50be72cb1e50c5ad47204d6ce29cb80d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2720 50be72cb1e50c5ad47204d6ce29cb80d.exe 2620 50be72cb1e50c5ad47204d6ce29cb80d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2620 2720 50be72cb1e50c5ad47204d6ce29cb80d.exe 30 PID 2720 wrote to memory of 2620 2720 50be72cb1e50c5ad47204d6ce29cb80d.exe 30 PID 2720 wrote to memory of 2620 2720 50be72cb1e50c5ad47204d6ce29cb80d.exe 30 PID 2720 wrote to memory of 2620 2720 50be72cb1e50c5ad47204d6ce29cb80d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\50be72cb1e50c5ad47204d6ce29cb80d.exe"C:\Users\Admin\AppData\Local\Temp\50be72cb1e50c5ad47204d6ce29cb80d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\50be72cb1e50c5ad47204d6ce29cb80d.exeC:\Users\Admin\AppData\Local\Temp\50be72cb1e50c5ad47204d6ce29cb80d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD5737f4a0acb1739ffd29e64f5466f0080
SHA107a53a3ce112fddb795e7c7451d023da3b597a3b
SHA25662cf1e205ac272e3c0a9ef7d3a020c5319598ed9ff49b3ff7f581cf480db68be
SHA512dc377cc02b36ba6cc4070f13c30b5c5ccc8bf0923dd7bad9c74db642455071f65dd145ac3a3735e9c5d7d4545938b0ce2c171adf6151c6b2d3d6095fbd45278a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
385KB
MD5f14b65147026855cfc29b48f1087d6c8
SHA10cebd7c41cadf0fad8b4763be7679592b38009ce
SHA2566260278ef1da20a335346b5563cee8140fe2a38a15de287e2c77afe097d01bf0
SHA512df33638290f5c910e01005cfc37a11508a5cd069540a592cde856de454f77ada730cbd116fdaa3718ed1bef63b775912aa58ae2c10ddbdd6b120cad7a290d543