Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 23:07
Behavioral task
behavioral1
Sample
54d50f16833eb3b450f5b9ad6b01422e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54d50f16833eb3b450f5b9ad6b01422e.exe
Resource
win10v2004-20231215-en
General
-
Target
54d50f16833eb3b450f5b9ad6b01422e.exe
-
Size
6.0MB
-
MD5
54d50f16833eb3b450f5b9ad6b01422e
-
SHA1
287633e37d6c84708cb9a600af11e052fe50a5f8
-
SHA256
7bd4d9c841b04604581d451c16ea22395d6c4e99c02bdf97956bda4fcef489e9
-
SHA512
edf900d33f3c85e9732e446bce6fec389c65cdc93976aa607ec124cac3d76d49f2eb9085e864fa524c8f144a5d488d75975c047b0700a44bd1052b569c018ba1
-
SSDEEP
98304:pUrvptEQOcak9i7GiJacakCidi4matHOcak9i7GiJacakb+G4NMul4WF4cak9i74:uoNdTudo4N3dTudVJquJCdTudo4N3dTt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2244 54d50f16833eb3b450f5b9ad6b01422e.exe -
Executes dropped EXE 1 IoCs
pid Process 2244 54d50f16833eb3b450f5b9ad6b01422e.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 54d50f16833eb3b450f5b9ad6b01422e.exe -
resource yara_rule behavioral1/memory/2320-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2320-17-0x0000000023B10000-0x0000000023D6C000-memory.dmp upx behavioral1/files/0x000d000000012265-16.dat upx behavioral1/files/0x000d000000012265-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 54d50f16833eb3b450f5b9ad6b01422e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 54d50f16833eb3b450f5b9ad6b01422e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 54d50f16833eb3b450f5b9ad6b01422e.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 54d50f16833eb3b450f5b9ad6b01422e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2320 54d50f16833eb3b450f5b9ad6b01422e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2320 54d50f16833eb3b450f5b9ad6b01422e.exe 2244 54d50f16833eb3b450f5b9ad6b01422e.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2244 2320 54d50f16833eb3b450f5b9ad6b01422e.exe 29 PID 2320 wrote to memory of 2244 2320 54d50f16833eb3b450f5b9ad6b01422e.exe 29 PID 2320 wrote to memory of 2244 2320 54d50f16833eb3b450f5b9ad6b01422e.exe 29 PID 2320 wrote to memory of 2244 2320 54d50f16833eb3b450f5b9ad6b01422e.exe 29 PID 2244 wrote to memory of 2696 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 30 PID 2244 wrote to memory of 2696 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 30 PID 2244 wrote to memory of 2696 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 30 PID 2244 wrote to memory of 2696 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 30 PID 2244 wrote to memory of 2796 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 34 PID 2244 wrote to memory of 2796 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 34 PID 2244 wrote to memory of 2796 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 34 PID 2244 wrote to memory of 2796 2244 54d50f16833eb3b450f5b9ad6b01422e.exe 34 PID 2796 wrote to memory of 2688 2796 cmd.exe 33 PID 2796 wrote to memory of 2688 2796 cmd.exe 33 PID 2796 wrote to memory of 2688 2796 cmd.exe 33 PID 2796 wrote to memory of 2688 2796 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\54d50f16833eb3b450f5b9ad6b01422e.exe"C:\Users\Admin\AppData\Local\Temp\54d50f16833eb3b450f5b9ad6b01422e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\54d50f16833eb3b450f5b9ad6b01422e.exeC:\Users\Admin\AppData\Local\Temp\54d50f16833eb3b450f5b9ad6b01422e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\54d50f16833eb3b450f5b9ad6b01422e.exe" /TN m8v9k5kD0c8e /F3⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN m8v9k5kD0c8e > C:\Users\Admin\AppData\Local\Temp\KDrtwGM.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2796
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN m8v9k5kD0c8e1⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD547394af2edbd4721edef22710ae3a790
SHA10d06a38f69c7997dc46b521a0532e8bb2af93569
SHA256565d9b49add884718eea48ff753687a55d57823bf37b539f25f1bd233d62cefa
SHA512dd905dc05f5a8423682d03f4ee511931220d507449385e2c94e7217e047e0c61b1e0a837c77da1fd2ec3d652e58f42b2dfb88d1d09d04dff2acb1086b992201d
-
Filesize
1KB
MD55e2eae6c584c8b1fb7012f46f7fc1f5d
SHA158475e5e72e5ce667029f5a2dd5eb51e21fef5e8
SHA256749662a94413b28183d1097e23a8fba00ac7ae20266bcb577af40cfc871418e8
SHA51223ccd83cd492f284299421a30d530ff5b4426ae0b6beb6976199fd7d8bb17cf08da42ff7bb1d4f3948d4b153e76b4ba1413686ace292c3b33e017a5d5f377aff
-
Filesize
77KB
MD5d910c9c0ee5d5094942396b8178fc630
SHA1dd455f28bab14b54757ef196929aa43a2f7cdca7
SHA2568a81539b0cea68d77bd4acd67721768bfd793a3868fb7b6ed27b85e577d382b3
SHA51200186e6aaa1d1698507d60c9e6d3807dc78bf3d6e516014e5b8490900340ceb2104ac64aa058bc6216acf56bc8b82cd078e795e9d702239fdff619aa8ae2e411