Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 04:36
Behavioral task
behavioral1
Sample
528d15ac2918497cac10bd5210726d5d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
528d15ac2918497cac10bd5210726d5d.exe
Resource
win10v2004-20231215-en
General
-
Target
528d15ac2918497cac10bd5210726d5d.exe
-
Size
1003KB
-
MD5
528d15ac2918497cac10bd5210726d5d
-
SHA1
20897db1e7d8ca3b8c7ef2d0604c9a2fd0357bff
-
SHA256
6bbaa1de4d6627d2a5ed6e28abe5cd2ac8bf4f202a3bcc5141460bf5458372df
-
SHA512
e63fca4fd05d616c0ee49e3eaf7ada6f76948ec85dd2b53ac96746052ce81e1ccd1b0bdba2584c920b83b5e302310770438767d6ea71bd51f888c7999254cb7d
-
SSDEEP
24576:dcymvs86U3p1E0Wq4NtAVpoHxpGQoadai7D3uITjIFOxo53ApIj:dpnU3jE/q4NKVpoRpGQ7ai7D3xTgOxYj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1684 528d15ac2918497cac10bd5210726d5d.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 528d15ac2918497cac10bd5210726d5d.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 528d15ac2918497cac10bd5210726d5d.exe -
resource yara_rule behavioral1/memory/2652-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/1684-17-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000013a1a-15.dat upx behavioral1/files/0x000a000000013a1a-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 528d15ac2918497cac10bd5210726d5d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 528d15ac2918497cac10bd5210726d5d.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 528d15ac2918497cac10bd5210726d5d.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 528d15ac2918497cac10bd5210726d5d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 528d15ac2918497cac10bd5210726d5d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2652 528d15ac2918497cac10bd5210726d5d.exe 1684 528d15ac2918497cac10bd5210726d5d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1684 2652 528d15ac2918497cac10bd5210726d5d.exe 34 PID 2652 wrote to memory of 1684 2652 528d15ac2918497cac10bd5210726d5d.exe 34 PID 2652 wrote to memory of 1684 2652 528d15ac2918497cac10bd5210726d5d.exe 34 PID 2652 wrote to memory of 1684 2652 528d15ac2918497cac10bd5210726d5d.exe 34 PID 1684 wrote to memory of 2560 1684 528d15ac2918497cac10bd5210726d5d.exe 30 PID 1684 wrote to memory of 2560 1684 528d15ac2918497cac10bd5210726d5d.exe 30 PID 1684 wrote to memory of 2560 1684 528d15ac2918497cac10bd5210726d5d.exe 30 PID 1684 wrote to memory of 2560 1684 528d15ac2918497cac10bd5210726d5d.exe 30 PID 1684 wrote to memory of 2572 1684 528d15ac2918497cac10bd5210726d5d.exe 33 PID 1684 wrote to memory of 2572 1684 528d15ac2918497cac10bd5210726d5d.exe 33 PID 1684 wrote to memory of 2572 1684 528d15ac2918497cac10bd5210726d5d.exe 33 PID 1684 wrote to memory of 2572 1684 528d15ac2918497cac10bd5210726d5d.exe 33 PID 2572 wrote to memory of 2704 2572 cmd.exe 31 PID 2572 wrote to memory of 2704 2572 cmd.exe 31 PID 2572 wrote to memory of 2704 2572 cmd.exe 31 PID 2572 wrote to memory of 2704 2572 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\528d15ac2918497cac10bd5210726d5d.exe"C:\Users\Admin\AppData\Local\Temp\528d15ac2918497cac10bd5210726d5d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\528d15ac2918497cac10bd5210726d5d.exeC:\Users\Admin\AppData\Local\Temp\528d15ac2918497cac10bd5210726d5d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\528d15ac2918497cac10bd5210726d5d.exe" /TN qm2lmOfce5f6 /F1⤵
- Creates scheduled task(s)
PID:2560
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\hVGNeYNku.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1003KB
MD5b285ae817a47e8ff3df7041cd3c6d9c4
SHA11ba2999694b60ca3dcd16e82221cda45f5f10cd4
SHA25641ae2741786038ba61658b9d409b5db4f17f9ff062a30213edf1e23c5b34196e
SHA512f62b990ac1e05432be4c108b21e1ec154b7b97e916b91712282837d89be107ff92f2fe9e8a2b3fdfd45625f0be8eb8b45bcbd4b1be8829887de10cb671840de1
-
Filesize
954KB
MD51e0667767af5ac2d3fe93fa777eeed66
SHA16a5cf64ce3d454b80089bea1fc553cef3cf67aeb
SHA256c5087baed32e52e2ae17d8bab2fde809e1ea8891572e79fe981d1e638c665686
SHA512d184496bf18d62bdc0c03062fb637eda1736121c57b4c4ae1f2a89db8c59fc6c807c21acc5cdfd6fd6e980e79e663961fb1c3955cec04bd0d9c479adbb332525