Analysis
-
max time kernel
61s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
37b87bb801399002ce5109fa582512de.exe
Resource
win7-20231215-en
General
-
Target
37b87bb801399002ce5109fa582512de.exe
-
Size
2.5MB
-
MD5
37b87bb801399002ce5109fa582512de
-
SHA1
d634ba38c689efef5c72f976b88b61e5bb78989a
-
SHA256
317b32811ef46a4dec52e650315c82b5a5f867f49e5844bb11ed4e1f5281e6d9
-
SHA512
fd066e3d8dd991dd78b0efeb09ce0bd4393dc234b82038ee3a22e6b64defa75fec6d54736fb9375a7e26773eb767f90c99b70e4f9a63c379d666a72f129823fd
-
SSDEEP
49152:kNoHMdmCm6Ud+zPXUk7GqCefc+dA1fh85ETksqhhiKOg8efG9CDNk3:kNosdmCmN+rE/D4PdUcEgnfiKOeDNS
Malware Config
Extracted
bitrat
1.35
storage.nsupdate.info:8973
-
communication_password
bf771c9d082071fe80b18bb678220682
-
tor_process
tor
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1520-3-0x0000000000290000-0x00000000002A2000-memory.dmp CustAttr -
resource yara_rule behavioral1/memory/560-22-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-37-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-51-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-35-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-34-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-33-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-32-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-28-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-56-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-57-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-59-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-58-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-55-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-53-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-60-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-61-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-62-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-63-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-66-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-67-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-68-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-69-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-71-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-72-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-73-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/560-74-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b87bb801399002ce5109fa582512de.exe"C:\Users\Admin\AppData\Local\Temp\37b87bb801399002ce5109fa582512de.exe"1⤵PID:1520
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uSZqfqgTOxUNw.exe"2⤵PID:1588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\37b87bb801399002ce5109fa582512de.exe"2⤵PID:2284
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uSZqfqgTOxUNw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF92E.tmp"2⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:560
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uSZqfqgTOxUNw.exe"2⤵PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5da31375129207a77b9cdef402fb91b9a
SHA144031f3d0d8fb4bfdbdf2acbc6f86c72af0045b3
SHA2564bc03ef0b04fe2d9c088b6e5e6e577b4fd4fef569803c6cf43a63f3ce9785f59
SHA51280677d70359461e3506e484bcb1b1ca47a45f8f542fc1ba9e275fbaeee206eb5f664a3d223a92b2f035eb03133956d84d3904c65cfef59030b5a5548b56488cd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4WPQ36BRDBKZ3HJJWTE1.temp
Filesize1KB
MD5174966116a11e4a196c9d4acb067473b
SHA10ce155387c4ab3eab3bf94d4fd2f47db05bbd8a8
SHA256a48ea7b656ea8c379149f4940ec6579fcc293aa77ee38e934e11400fd43f70cb
SHA5127333eb653c3ec30ba84d59d7b4f5f30829380224ec0848f1b8c8a7d7c91ffccffd970a1d7b3009d9baed4ed9d6a5f91bbfac3435a499ca97ea7eb9ca85243f1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5a22853b7001aeb2e4066fd37643b1176
SHA189c5728bcc58ca587b890d251e1e67c8d93d8c33
SHA256657808aafb2570f16153509a61c4ca53a7882507e7d807b88ce561c30ea4be83
SHA512f6bca647506f3cb9a1809fa8093b0558e15fdcfafd25f933c2aaf564eb68e85c8c2d1f73ba43030ad21666a25aac6fd8a0544e824583df97a12aea5e41135beb